Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

github.com/mholt/archiver: CVE-2019-10743 #570

Closed
github-actions bot opened this issue May 10, 2022 · 1 comment
Closed

github.com/mholt/archiver: CVE-2019-10743 #570

github-actions bot opened this issue May 10, 2022 · 1 comment

Comments

@github-actions
Copy link

Title

mholt/archiver: aribtrary file write via unsanitized destination filepaths

Description

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

Severity

MEDIUM

Primary URL

https://avd.aquasec.com/nvd/cve-2019-10743

References

@pavansokkenagaraj
Copy link
Contributor

created for testing: https://github.com/replicatedhq/troubleshoot/runs/6361891768?check_suite_focus=true
closing and should be fixed in #569

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant