2 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

stripe-cli is a command-line tool for the payment processor Stripe. A vulnerability exists in stripe-cli starting in version 1.11.1 and prior to version 1.21.3 where a plugin package containing a manifest with a malformed plugin shortname installed using the --archive-url or --archive-path flags can overwrite arbitrary files. The update in version 1.21.3 addresses the path traversal vulnerability by removing the ability to install plugins from an archive URL or path. There has been no evidence of exploitation of this vulnerability. • CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H https://github.com/stripe/stripe-cli/security/advisories/GHSA-fv4g-gwpj-74gr • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 0

Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. • https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •