Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1274215 | Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/10/21/7 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3935-1/ | Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Jun/18 | Exploit Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2019/Jun/14 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Aug/20 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-08-07 10:29
Updated : 2021-02-19 07:57
NVD link : CVE-2011-5325
Mitre link : CVE-2011-5325
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
busybox
- busybox