CVE-2025-0377
Published: 21 January 2025
Summary
CVE-2025-0377 is a high-severity Link Following (CWE-59) vulnerability in Hashicorp Go-Slug. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the path traversal flaw in HashiCorp's go-slug library by identifying, reporting, and applying vendor-provided patches or updates.
Validates user-provided paths from tar entries to ensure they do not contain traversal sequences like '../', preventing extraction outside intended directories.
Enforces least privilege on processes performing tar extraction, limiting the ability to access or disclose sensitive files even if path traversal occurs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote path traversal in archive extraction directly enables T1190 for unauthenticated network exploitation and facilitates T1005 by allowing arbitrary sensitive file reads on the local system.
NVD Description
HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.
Deeper analysisAI
CVE-2025-0377 is a path traversal vulnerability (CWE-59) in HashiCorp's go-slug library, enabling a zip-slip style attack during tar archive extraction. The flaw arises when a non-existing user-provided path in a tar entry is processed, allowing traversal outside intended directories. Published on 2025-01-21, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity primarily due to confidentiality risks.
Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction. By supplying a malicious tar archive, they can traverse paths to access sensitive files, achieving high-impact unauthorized disclosure of information without altering integrity or availability.
HashiCorp's security advisory (HCSEC-2025-01) provides details on the issue and mitigation at https://discuss.hashicorp.com/t/hcsec-2025-01-hashicorp-go-slug-vulnerable-to-zip-slip-attack.
Details
- CWE(s)