Description
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-846-1 | libzip-ruby security update |
Debian DSA |
DSA-3801-1 | ruby-zip security update |
EUVD |
EUVD-2017-0236 | The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem. |
Github GHSA |
GHSA-gcqq-w6gr-h9j9 | Directory traversal vulnerability in RubyZip |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:18:49.419Z
Reserved: 2017-02-09T00:00:00.000Z
Link: CVE-2017-5946
No data.
Status : Modified
Published: 2017-02-27T07:59:00.317
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5946
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA