Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h74j-692g-48mq

Опубликовано: 18 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.5

Описание

Path Traversal in MHolt Archiver

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

Specific Go Packages Affected

github.com/mholt/archiver/cmd/arc

Пакеты

Наименование

github.com/mholt/archiver

go
Затронутые версииВерсия исправления

>= 3.0.0, < 3.3.2

3.3.2

EPSS

Процентиль: 79%
0.01238
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-22
CWE-29

Связанные уязвимости

CVSS3: 5.5
redhat
больше 6 лет назад

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

CVSS3: 5.5
nvd
больше 6 лет назад

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

EPSS

Процентиль: 79%
0.01238
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-22
CWE-29