Conda-build contains commands and tools to build conda packages. Prior to version 25.4.0, the conda-build processing logic is vulnerable to path traversal (Tarslip) attacks due to improper sanitization of tar entry paths. Attackers can craft tar archives containing entries with directory traversal sequences to write files outside the intended extraction directory. This could lead to arbitrary file overwrites, privilege escalation, or code execution if sensitive locations are targeted. This issue has been patched in version 25.4.0.
History

Wed, 02 Jul 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Anaconda
Anaconda conda-build
CPEs cpe:2.3:a:anaconda:conda-build:*:*:*:*:*:*:*:*
Vendors & Products Anaconda
Anaconda conda-build
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 17 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
Description Conda-build contains commands and tools to build conda packages. Prior to version 25.4.0, the conda-build processing logic is vulnerable to path traversal (Tarslip) attacks due to improper sanitization of tar entry paths. Attackers can craft tar archives containing entries with directory traversal sequences to write files outside the intended extraction directory. This could lead to arbitrary file overwrites, privilege escalation, or code execution if sensitive locations are targeted. This issue has been patched in version 25.4.0.
Title Conda-build Vulnerable to Path Traversal via Malicious Tar File
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 5.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-06-16T20:23:02.645Z

Updated: 2025-06-17T18:10:29.876Z

Reserved: 2025-04-10T12:51:12.282Z

Link: CVE-2025-32799

cve-icon Vulnrichment

Updated: 2025-06-17T18:10:24.714Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-16T21:15:23.683

Modified: 2025-07-02T18:12:39.140

Link: CVE-2025-32799

cve-icon Redhat

No data.