Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10862

Опубликовано: 21 июн. 2018
Источник: redhat
CVSS3: 7.6

Описание

WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.

It was found that the explode function of the deployment utility in jboss-cli and console that allows extraction of files from an archive does not perform necessary validation for directory traversal. This can lead to remote code execution.

Отчет

This vulnerability can only be exploited by users with deployment permissions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
JBoss Developer Studio 11wildflyNot affected
Red Hat BPM Suite 6wildflyNot affected
Red Hat Fuse 7wildflyNot affected
Red Hat JBoss BRMS 6wildflyNot affected
Red Hat JBoss Data Grid 6wildflyNot affected
Red Hat JBoss Data Virtualization 6wildflyOut of support scope
Red Hat JBoss Enterprise Application Platform 6wildflyNot affected
Red Hat JBoss Fuse 6wildflyNot affected
Red Hat JBoss Operations Network 3wildflyNot affected
Red Hat OpenShift Application RuntimeswildflyAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1593527wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 5.5
nvd
больше 7 лет назад

WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.

CVSS3: 5.5
debian
больше 7 лет назад

WildFly Core before version 6.0.0.Alpha3 does not properly validate fi ...

CVSS3: 5.5
github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in WildFly

7.6 High

CVSS3