Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5946

Опубликовано: 27 фев. 2017
Источник: debian
EPSS Низкий

Описание

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-zipfixed1.2.0-1.1package
libzip-rubyremovedpackage

Примечания

  • https://github.com/rubyzip/rubyzip/issues/315

EPSS

Процентиль: 90%
0.05924
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 7
redhat
около 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 9.8
nvd
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

suse-cvrf
больше 8 лет назад

Security update for rubygem-rubyzip

CVSS3: 9.8
github
больше 8 лет назад

Directory traversal vulnerability in RubyZip

EPSS

Процентиль: 90%
0.05924
Низкий