mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
References
Link | Resource |
---|---|
https://0xacab.org/jvoisin/mat2/-/commit/beebca4bf1cd3b935824c966ce077e7bcf610385 | Exploit Patch Vendor Advisory |
https://dustri.org/b/mat2-0130.html | Patch Third Party Advisory |
https://0xacab.org/jvoisin/mat2/-/issues/174 | Exploit Issue Tracking Vendor Advisory |
https://www.debian.org/security/2022/dsa-5185 | Third Party Advisory |
Information
Published : 2022-07-08 11:15
Updated : 2022-07-20 10:29
NVD link : CVE-2022-35410
Mitre link : CVE-2022-35410
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
debian
- debian_linux
0xacab
- mat2