rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
References
Link | Resource |
---|---|
https://github.com/rubyzip/rubyzip/issues/369 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3466 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html | Mailing List Third Party Advisory |
Information
Published : 2018-06-26 09:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-1000544
Mitre link : CVE-2018-1000544
JSON object : View
CWE
Products Affected
debian
- debian_linux
redhat
- cloudforms
rubyzip_project
- rubyzip