perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10860 | Issue Tracking Patch Third Party Advisory | 
| http://www.securityfocus.com/bid/104580 | Third Party Advisory VDB Entry | 
| https://usn.ubuntu.com/3703-2/ | Third Party Advisory | 
| https://usn.ubuntu.com/3703-1/ | Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2018/07/msg00032.html | Mailing List Third Party Advisory | 
| https://www.debian.org/security/2018/dsa-4300 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Information
                Published : 2018-06-29 12:29
Updated : 2018-09-23 03:29
NVD link : CVE-2018-10860
Mitre link : CVE-2018-10860
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                debian
- debian_linux
canonical
- ubuntu_linux
perl-archive-zip_project
- perl-archive-zip


