Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1102 | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability. |
Github GHSA |
GHSA-mm6g-mmq6-53ff | Path Traversal in SharpZipLib |
Tue, 22 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T18:32:19.882Z
Reserved: 2021-05-12T00:00:00.000Z
Link: CVE-2021-32842
Updated: 2024-08-03T23:33:55.920Z
Status : Modified
Published: 2022-01-26T21:15:13.337
Modified: 2024-11-21T06:07:51.860
Link: CVE-2021-32842
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA