Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-52138

Опубликовано: 05 фев. 2024
Источник: debian
EPSS Низкий

Описание

Engrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (RCE) on the target. While handling CPIO archives, the Engrampa Archive manager follows symlink, cpio by default will follow stored symlinks while extracting and the Archiver will not check the symlink location, which leads to arbitrary file writes to unintended locations. When the victim extracts the archive, the attacker can craft a malicious cpio or ISO archive to achieve RCE on the target system. This vulnerability was fixed in commit 63d5dfa.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
engrampafixed1.26.2-1package

Примечания

  • https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v

  • https://github.com/mate-desktop/engrampa/commit/63d5dfa9005c6b16d0f0ccd888cc859fca78f970

EPSS

Процентиль: 83%
0.01882
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 2 года назад

Engrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (RCE) on the target. While handling CPIO archives, the Engrampa Archive manager follows symlink, cpio by default will follow stored symlinks while extracting and the Archiver will not check the symlink location, which leads to arbitrary file writes to unintended locations. When the victim extracts the archive, the attacker can craft a malicious cpio or ISO archive to achieve RCE on the target system. This vulnerability was fixed in commit 63d5dfa.

CVSS3: 8.2
nvd
почти 2 года назад

Engrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (RCE) on the target. While handling CPIO archives, the Engrampa Archive manager follows symlink, cpio by default will follow stored symlinks while extracting and the Archiver will not check the symlink location, which leads to arbitrary file writes to unintended locations. When the victim extracts the archive, the attacker can craft a malicious cpio or ISO archive to achieve RCE on the target system. This vulnerability was fixed in commit 63d5dfa.

CVSS3: 9.6
redos
больше 1 года назад

Уязвимость engrampa

CVSS3: 9.6
fstec
почти 2 года назад

Уязвимость менеджер архивов Engrampa, связанная с неправильным ограничением пути к ограниченному каталогу , позволяющая нарушителю загружать файлы в произвольные места в системе

EPSS

Процентиль: 83%
0.01882
Низкий