Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1002204

Опубликовано: 08 янв. 2015
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.

Отчет

While Red Hat Mobile Application Platform (RHMAP) does include the vulnerable library, it does not use the vulnerable methods extract* fixed in the library, [1]. RHMAP upgrade the vulnerable library in a future version. Red Hat Quay includes adm-zip as a dependency of protractor which is only used at build time. The vulnerable library is not used at runtime meaning this has a low impact on Red Hat Quay. [1] https://github.com/cthackers/adm-zip/commit/6f4dfeb9a2166e93207443879988f97d88a37cde

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4nodejs-adm-zipAffected
Red Hat Quay 3quay/quay-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1584400nodejs-adm-zip: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file

EPSS

Процентиль: 95%
0.17577
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
больше 7 лет назад

adm-zip npm library before 0.4.9 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.

CVSS3: 5.5
github
больше 7 лет назад

Arbitrary File Write in adm-zip

CVSS3: 9.6
fstec
больше 7 лет назад

Уязвимость функции extractDir библиотеки Node.js для работы с zip-файлами Adm-zip, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.17577
Средний

5.3 Medium

CVSS3