Логотип exploitDog
bind:CVE-2026-30973
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-30973

Количество 2

Количество 2

nvd логотип

CVE-2026-30973

около 1 месяца назад

Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rfx7-4xw3-gh4m

около 1 месяца назад

@appium/support has a Zip Slip arbitrary file write in its ZIP extraction

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-30973

Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6.

CVSS3: 6.5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-rfx7-4xw3-gh4m

@appium/support has a Zip Slip arbitrary file write in its ZIP extraction

CVSS3: 6.5
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу