{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-32698","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-05-11T16:33:45.734Z","datePublished":"2023-05-30T03:56:30.807Z","dateUpdated":"2025-01-10T20:36:22.810Z"},"containers":{"cna":{"title":"nfpm vulnerable to Incorrect Default Permissions","problemTypes":[{"descriptions":[{"cweId":"CWE-276","lang":"en","description":"CWE-276: Incorrect Default Permissions","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c","tags":["x_refsource_CONFIRM"],"url":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c"},{"name":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30","tags":["x_refsource_MISC"],"url":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30"},{"name":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0","tags":["x_refsource_MISC"],"url":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0"}],"affected":[{"vendor":"goreleaser","product":"nfpm","versions":[{"version":">= 2.0.0, < 2.29.0","status":"affected"},{"version":">= 0.1.0, < 2.29.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-05-30T03:56:30.807Z"},"descriptions":[{"lang":"en","value":"nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged \nthe files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders."}],"source":{"advisory":"GHSA-w7jw-q4fg-qc4c","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:25:36.897Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c"},{"name":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30"},{"name":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-10T20:36:13.134834Z","id":"CVE-2023-32698","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-10T20:36:22.810Z"}}]}}