WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.
References
Link | Resource |
---|---|
https://snyk.io/research/zip-slip-vulnerability | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10862 | Issue Tracking Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2279 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2277 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2276 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2428 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2425 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2424 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2423 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2643 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:0877 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Information
Published : 2018-07-27 07:29
Updated : 2019-04-26 08:08
NVD link : CVE-2018-10862
Mitre link : CVE-2018-10862
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
redhat
- virtualization
- wildfly_core
- enterprise_linux
- jboss_enterprise_application_platform