Directory Traversal Affecting nushell package, versions <0.102.0-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.09% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-NUSHELL-9480324
  • published18 Mar 2025
  • disclosed17 Mar 2025

Introduced: 17 Mar 2025

CVE-2025-29787  (opens in a new tab)
CWE-22  (opens in a new tab)
CWE-61  (opens in a new tab)
CWE-180  (opens in a new tab)

How to fix?

Upgrade Chainguard nushell to version 0.102.0-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nushell package and not the nushell package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

zip is a zip library for rust which supports reading and writing of simple ZIP files. In the archive extraction routine of affected versions of the zip crate starting with version 1.3.0 and prior to version 2.3.0, symbolic links earlier in the archive are allowed to be used for later files in the archive without validation of the final canonicalized path, allowing maliciously crafted archives to overwrite arbitrary files in the file system when extracted. Users who extract untrusted archive files using the following high-level API method may be affected and critical files on the system may be overwritten with arbitrary file permissions, which can potentially lead to code execution. Version 2.3.0 fixes the issue.