Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-5946

Опубликовано: 04 фев. 2017
Источник: redhat
CVSS3: 7

Описание

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

Отчет

This issue affects the versions of rubygem-rubyzip as shipped with Red Hat Quick Cloud Installer. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Quickstart Cloud Installer 1tfm-rubygem-rubyzipUnder investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1427937rubygem-rubyzip: Directory traversal in the Zip::File component

7 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 9.8
nvd
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.

CVSS3: 9.8
debian
почти 9 лет назад

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a ...

suse-cvrf
больше 8 лет назад

Security update for rubygem-rubyzip

CVSS3: 9.8
github
больше 8 лет назад

Directory traversal vulnerability in RubyZip

7 High

CVSS3