malcontent vulnerable to symlink Path Traversal via handleSymlink argument confusion in archive extraction
Moderate severity
GitHub Reviewed
Published
Jan 29, 2026
in
chainguard-dev/malcontent
•
Updated Jan 31, 2026
Package
Affected versions
>= 1.8.0, < 1.20.3
Patched versions
1.20.3
Description
Published to the GitHub Advisory Database
Jan 29, 2026
Reviewed
Jan 29, 2026
Published by the National Vulnerability Database
Jan 29, 2026
Last updated
Jan 31, 2026
malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The
handleSymlinkfunction received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory.Fixes:
Acknowledgements
Thank you to Oleh Konko from 1seal for discovering and reporting this issue.
References