Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-1000472

Опубликовано: 03 янв. 2018
Источник: nvd
CVSS3: 6.5
CVSS2: 5.8
EPSS Низкий

Описание

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*
Версия до 1.8 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

EPSS

Процентиль: 64%
0.00472
Низкий

6.5 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 8 лет назад

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".

CVSS3: 6.5
debian
около 8 лет назад

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO ...

CVSS3: 6.5
github
больше 3 лет назад

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".

EPSS

Процентиль: 64%
0.00472
Низкий

6.5 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-22