Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-4fg7-vxc8-qx5w: rage vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution

A plugin name containing a path separator may allow an attacker to execute an arbitrary binary.

Such a plugin name can be provided to the rage CLI through an attacker-controlled recipient or identity string, or to the following age APIs when the plugin feature flag is enabled:

On UNIX systems, a directory matching age-plugin-* needs to exist in the working directory for the attack to succeed.

The binary is executed with a single flag, either --age-plugin=recipient-v1 or --age-plugin=identity-v1. The standard input includes the recipient or identity string, and the random file key (if encrypting) or the header of the file (if decrypting). The format is constrained by the age-plugin protocol.

An equivalent issue was fixed in the reference Go implementation of age, see advisory GHSA-32gq-x56h-299c.

Thanks to ⬡-49016 for reporting this issue.

ghsa
#vulnerability#web#git

Skip to content

Navigation Menu

    • GitHub Copilot

      Write better code with AI

    • Security

      Find and fix vulnerabilities

    • Actions

      Automate any workflow

    • Codespaces

      Instant dev environments

    • Issues

      Plan and track work

    • Code Review

      Manage code changes

    • Discussions

      Collaborate outside of code

    • Code Search

      Find more, search less

  • Explore

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • Executive Insights
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    • Enterprise platform

      AI-powered developer platform

  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-4fg7-vxc8-qx5w

rage vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution

Moderate severity GitHub Reviewed Published Dec 18, 2024 in str4d/rage • Updated Dec 18, 2024

Package

Affected versions

= 0.6.0

>= 0.7.0, < 0.7.2

>= 0.8.0, < 0.8.2

>= 0.9.0, < 0.9.3

= 0.10.0

= 0.11.0

Patched versions

0.6.1

0.7.2

0.8.2

0.9.3

0.10.1

0.11.1

= 0.6.0

>= 0.7.0, < 0.7.2

>= 0.8.0, < 0.8.2

>= 0.9.0, < 0.9.3

= 0.10.0

= 0.11.0

0.6.1

0.7.2

0.8.2

0.9.3

0.10.1

0.11.1

Description

Published to the GitHub Advisory Database

Dec 18, 2024

Last updated

Dec 18, 2024

ghsa: Latest News

GHSA-2p6p-9rc9-62j9: Craft CMS has potential RCE when PHP `register_argc_argv` config setting is enabled