Description
nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged
the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.
Published: 2023-05-30
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1637 nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged the files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.
Github GHSA Github GHSA GHSA-w7jw-q4fg-qc4c nfpm has incorrect default permissions
History

Fri, 10 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-10T20:36:22.810Z

Reserved: 2023-05-11T16:33:45.734Z

Link: CVE-2023-32698

cve-icon Vulnrichment

Updated: 2024-08-02T15:25:36.897Z

cve-icon NVD

Status : Modified

Published: 2023-05-30T04:15:10.187

Modified: 2024-11-21T08:03:52.560

Link: CVE-2023-32698

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses