Update dependency tmp to ^0.2.0 [SECURITY]#11469
Update dependency tmp to ^0.2.0 [SECURITY]#11469renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
7ddeb34 to
f8461fc
Compare
|
Caution Review the following alerts detected in dependencies. According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. It is recommended to resolve "Warn" alerts too. Learn more about Socket for GitHub.
|
f8461fc to
e8becb6
Compare
4121f56 to
3ec59e3
Compare
5b3a268 to
b2caadf
Compare
b2caadf to
9b09b24
Compare
df8df4d to
cf90431
Compare
b42ae6b to
793e6ad
Compare
c960b5a to
146c59d
Compare
d3d18d6 to
be7d97c
Compare
be7d97c to
9d468e1
Compare
9d468e1 to
b49ff69
Compare
b49ff69 to
9e3dca8
Compare
9e3dca8 to
b4a7c1f
Compare
b4a7c1f to
69a0cc8
Compare
69a0cc8 to
bfee486
Compare
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
bfee486 to
136da30
Compare
This PR contains the following updates:
^0.1.0→^0.2.0GitHub Vulnerability Alerts
CVE-2025-54798
Summary
tmp@0.2.3is vulnerable to an Arbitrary temporary file / directory write via symbolic linkdirparameter.Details
According to the documentation there are some conditions that must be held:
Related issue: https://github.com/raszi/node-tmp/issues/207.
The issue occurs because
_resolvePathdoes not properly handle symbolic link when resolving paths:If the
dirparameter points to a symlink that resolves to a folder outside thetmpDir, it's possible to bypass the_assertIsRelativecheck used in_assertAndSanitizeOptions:PoC
The following PoC demonstrates how writing a tmp file on a folder outside the
tmpDiris possible.Tested on a Linux machine.
tmpDirthat points to a directory outside of it$HOME/mydir1(outside thetmpDir):main.jsA Potential fix could be to call
fs.realpathSync(or similar) that resolves also symbolic links.Impact
Arbitrary temporary file / directory write via symlink
Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:Ntmp allows arbitrary temporary file / directory write via symbolic link
dirparameterCVE-2025-54798 / GHSA-52f5-9888-hmc6
More information
Details
Summary
tmp@0.2.3is vulnerable to an Arbitrary temporary file / directory write via symbolic linkdirparameter.Details
According to the documentation there are some conditions that must be held:
Related issue: https://github.com/raszi/node-tmp/issues/207.
The issue occurs because
_resolvePathdoes not properly handle symbolic link when resolving paths:If the
dirparameter points to a symlink that resolves to a folder outside thetmpDir, it's possible to bypass the_assertIsRelativecheck used in_assertAndSanitizeOptions:PoC
The following PoC demonstrates how writing a tmp file on a folder outside the
tmpDiris possible.Tested on a Linux machine.
tmpDirthat points to a directory outside of it$HOME/mydir1(outside thetmpDir):main.jsA Potential fix could be to call
fs.realpathSync(or similar) that resolves also symbolic links.Impact
Arbitrary temporary file / directory write via symlink
Severity
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
raszi/node-tmp (tmp)
v0.2.4Compare Source
v0.2.3Compare Source
v0.2.2Compare Source
🐛 Bug Fix
📝 Documentation
Committers: 5
v0.2.1Compare Source
🚀 Enhancement
🏠 Internal
Committers: 1
v0.2.0Compare Source
🚀 Enhancement
🐛 Bug Fix
📝 Documentation
🏠 Internal
Committers: 2
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.