perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10860 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/104580 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/3703-2/ | Third Party Advisory |
https://usn.ubuntu.com/3703-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/07/msg00032.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4300 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-06-29 12:29
Updated : 2018-09-23 03:29
NVD link : CVE-2018-10860
Mitre link : CVE-2018-10860
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
perl-archive-zip_project
- perl-archive-zip