Miggo Logo

CVE-2023-41057: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in hyper-bump-it

3.3

CVSS Score
3.1

Basic Information

EPSS Score
0.2437%
Published
9/4/2023
Updated
11/4/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
hyper-bump-itpip< 0.5.10.5.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in the file processing logic where the user-supplied file_glob from the configuration is directly combined with project_root using project_root.glob(). This lacks validation to ensure the resolved paths remain within the project root. The explicit code reference (files.py line 35) and the described attack vector (using ../* in the glob) confirm this as the root cause. While the exact function name is not provided, the code's location and behavior are sufficient to identify the vulnerable logic with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry `*yp*r-*ump-it` r***s * *il* *lo* p*tt*rn *rom t** *on*i*ur*tion *il*. T**t is *om*in** wit* t** proj**t root *ir**tory to *onstru*t * *ull *lo* p*tt*rn t**t is us** to *in* *il*s t**t s*oul* ** **it**. T**s* m*t**** *il*s s*oul* ** *ont*

Reasoning

T** vuln*r**ility o**urs in t** *il* pro**ssin* lo*i* w**r* t** us*r-suppli** `*il*_*lo*` *rom t** *on*i*ur*tion is *ir**tly *om*in** wit* `proj**t_root` usin* `proj**t_root.*lo*()`. T*is l**ks v*li**tion to *nsur* t** r*solv** p*t*s r*m*in wit*in t*