Description
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Published: 2017-02-27
Score: 9.8 Critical
EPSS: 5.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-846-1 libzip-ruby security update
Debian DSA Debian DSA DSA-3801-1 ruby-zip security update
EUVD EUVD EUVD-2017-0236 The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Github GHSA Github GHSA GHSA-gcqq-w6gr-h9j9 Directory traversal vulnerability in RubyZip
History

No history.

Subscriptions

Debian Debian Linux
Rubyzip Project Rubyzip
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:18:49.419Z

Reserved: 2017-02-09T00:00:00.000Z

Link: CVE-2017-5946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-02-27T07:59:00.317

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-5946

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-02-04T00:00:00Z

Links: CVE-2017-5946 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses