Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.
An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
References
Link | Resource |
---|---|
https://security.nozominetworks.com/NN-2023:16-01 |
Configurations
No configuration.
History
No history.
Information
Published : 2024-05-15 17:15
Updated : 2024-05-28 13:15
NVD link : CVE-2023-5938
Mitre link : CVE-2023-5938
CVE.ORG link : CVE-2023-5938
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')