FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
References
Link | Resource |
---|---|
https://github.com/Sigil-Ebook/flightcrew/issues/52 | Exploit Third Party Advisory |
https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/ | Exploit Third Party Advisory |
https://usn.ubuntu.com/4055-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2019-07-04 08:15
Updated : 2023-02-28 12:48
NVD link : CVE-2019-13241
Mitre link : CVE-2019-13241
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
canonical
- ubuntu_linux
flightcrew_project
- flightcrew