Sigil before 0.9.16 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
References
Link | Resource |
---|---|
https://github.com/Sigil-Ebook/Sigil/commit/0979ba8d10c96ebca330715bfd4494ea0e019a8f | Patch Third Party Advisory |
https://github.com/Sigil-Ebook/Sigil/compare/ea7f27d...5b867e5 | Third Party Advisory |
https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 | Third Party Advisory |
https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 | Third Party Advisory |
https://github.com/Sigil-Ebook/Sigil/commit/04e2f280cc4a0766bedcc7b9eb56449ceecc2ad4 | Patch Third Party Advisory |
https://github.com/Sigil-Ebook/Sigil/commit/369eebe936e4a8c83cc54662a3412ce8bef189e4 | Patch Third Party Advisory |
https://github.com/Sigil-Ebook/Sigil/releases/tag/0.9.16 | Release Notes Third Party Advisory |
https://usn.ubuntu.com/4085-1/ | Third Party Advisory |
https://salvatoresecurity.com/zip-slip-in-sigil-cve-2019-14452/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-07-30 19:15
Updated : 2019-08-05 15:15
NVD link : CVE-2019-14452
Mitre link : CVE-2019-14452
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
canonical
- ubuntu_linux
flightcrew_project
- flightcrew
sigil-ebook
- sigil