mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
References
Link | Resource |
---|---|
https://0xacab.org/jvoisin/mat2/-/commit/beebca4bf1cd3b935824c966ce077e7bcf610385 | Exploit Patch Vendor Advisory |
https://0xacab.org/jvoisin/mat2/-/issues/174 | Exploit Issue Tracking Vendor Advisory |
https://dustri.org/b/mat2-0130.html | Patch Third Party Advisory |
https://www.debian.org/security/2022/dsa-5185 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-07-08T17:35:23
Updated: 2022-07-16T02:06:06
Reserved: 2022-07-08T00:00:00
Link: CVE-2022-35410
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-08T18:15:10.103
Modified: 2022-07-20T17:29:29.890
Link: CVE-2022-35410
JSON object: View
Redhat Information
No data.
CWE