rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:3466 | Third Party Advisory |
https://github.com/rubyzip/rubyzip/issues/369 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-06-26T16:00:00
Updated: 2020-08-01T21:06:08
Reserved: 2018-06-15T00:00:00
Link: CVE-2018-1000544
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-26T16:29:02.353
Modified: 2020-08-24T17:37:01.140
Link: CVE-2018-1000544
JSON object: View
Redhat Information
No data.