CVE-2023-41057: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in hyper-bump-it
3.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2437%
CWE
Published
9/4/2023
Updated
11/4/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| hyper-bump-it | pip | < 0.5.1 | 0.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the file processing logic where the user-supplied file_glob from the configuration is directly combined with project_root using project_root.glob(). This lacks validation to ensure the resolved paths remain within the project root. The explicit code reference (files.py line 35) and the described attack vector (using ../* in the glob) confirm this as the root cause. While the exact function name is not provided, the code's location and behavior are sufficient to identify the vulnerable logic with high confidence.