{"uuid": "a3c0065e-5e5b-4f71-bb6d-02d6e42fc3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47877", "type": "seen", "source": "https://t.me/cvedetector/7712", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47877 - Extract Library Symlink Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47877 \nPublished : Oct. 11, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. This vulnerability is fixed in 4.0.0. If you're using the Extractor.FS interface, then upgrading to /v4 will require to implement the new methods that have been added. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-11T19:33:22.000000Z"}