Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-5946

Опубликовано: 27 фев. 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:ruby:*:*
Версия до 1.2.1 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05924
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 7
redhat
около 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 9.8
debian
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a ...

suse-cvrf
больше 8 лет назад

Security update for rubygem-rubyzip

CVSS3: 9.8
github
больше 8 лет назад

Directory traversal vulnerability in RubyZip

EPSS

Процентиль: 90%
0.05924
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22