Описание
Directory traversal vulnerability in RubyZip
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses ../ pathname substrings to write arbitrary files to the filesystem.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-5946
- https://github.com/rubyzip/rubyzip/issues/315
- https://github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2017-5946.yml
- https://github.com/rubyzip/rubyzip/releases
- https://web.archive.org/web/20200227185727/http://www.securityfocus.com/bid/96445
- http://www.debian.org/security/2017/dsa-3801
Пакеты
rubyzip
< 1.2.1
1.2.1
Связанные уязвимости
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a ...