{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T13:10:49.111","vulnerabilities":[{"cve":{"id":"CVE-2023-32698","sourceIdentifier":"security-advisories@github.com","published":"2023-05-30T04:15:10.187","lastModified":"2024-11-21T08:03:52.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged \nthe files (without extra config for enforcing it’s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders."},{"lang":"es","value":"nFPM es una alternativa a fpm. Los permisos de los archivos registrados no se mantenían. Por lo tanto, cuando nfpm empaquetaba los archivos (sin configuración adicional para hacer cumplir sus propios permisos) los archivos podían salir con permisos incorrectos (chmod 666 o 777). Cualquiera que utilice nfpm para crear paquetes sin comprobar/configurar los permisos de los archivos antes de empaquetarlos podría dar lugar a permisos incorrectos para los archivos/carpetas. "}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:goreleaser:nfpm:*:*:*:*:*:*:*:*","versionStartIncluding":"0.1.0","versionEndExcluding":"2.29.0","matchCriteriaId":"325B45DF-6615-4FC7-B712-4A80B0661905"}]}]}],"references":[{"url":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/goreleaser/nfpm/releases/tag/v2.29.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}