Description
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1467-1 | ruby-zip security update |
Debian DLA |
DLA-2307-1 | ruby-zip security update |
EUVD |
EUVD-2018-0470 | rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem.. |
Github GHSA |
GHSA-vqcq-mrmw-mcmg | Rubyzip gem contains a Directory Traversal vulnerability in zip file component |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:47.264Z
Reserved: 2018-06-15T00:00:00.000Z
Link: CVE-2018-1000544
No data.
Status : Modified
Published: 2018-06-26T16:29:02.353
Modified: 2024-11-21T03:40:09.873
Link: CVE-2018-1000544
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA