Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-30333

Опубликовано: 09 мая 2022
Источник: debian

Описание

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
unrar-nonfreefixed1:6.1.7-1package
unrar-nonfreefixed1:6.0.3-1+deb11u1bullseyepackage
unrar-nonfreefixed1:5.6.6-1+deb10u1busterpackage
unrar-nonfreeno-dsastretchpackage
rarfixed2:6.20~b1-0.1package
rarfixed2:6.20-0.1~deb11u1bullseyepackage
rarno-dsastretchpackage

Примечания

  • 6.12 application version corresponds to 6.1.7 source version:

  • https://github.com/debian-calibre/unrar-nonfree/compare/upstream/6.1.6...upstream/6.1.7

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

CVSS3: 7.5
nvd
больше 3 лет назад

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

suse-cvrf
больше 3 лет назад

Security update for unrar

CVSS3: 7.5
github
больше 3 лет назад

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

CVSS3: 4.3
fstec
больше 3 лет назад

Уязвимость средства разархивирования файлов UnRAR, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю перезаписать произвольные файлы