Description
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a path traversal vulnerability that allows attackers to read arbitrary files by supplying an unvalidated transcript_path value via stdin JSON. Attackers can access any file readable by the process and the file metadata is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
234d9aad919b51326a43bcf90b45ae35c23afc30 (git)
Credits
Katriel Moses
References
github.com/jarrodwatts/claude-hud/issues/485
github.com/jarrodwatts/claude-hud/pull/487
github.com/...ommit/234d9aad919b51326a43bcf90b45ae35c23afc30
www.vulncheck.com/...-hud-path-traversal-via-transcript-path