Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2746 | sbt is a build tool for Scala, Java, and others. Given a specially crafted zip or JAR file, `IO.unzip` allows writing of arbitrary file. This would have potential to overwrite `/root/.ssh/authorized_keys`. Within sbt's main code, `IO.unzip` is used in `pullRemoteCache` task and `Resolvers.remote`; however many projects use `IO.unzip(...)` directly to implement custom tasks. This vulnerability has been patched in version 1.9.7. |
Github GHSA |
GHSA-h9mw-grgx-2fhf | sbt vulnerable to arbitrary file write via archive extraction (Zip Slip) |
Wed, 18 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-17T13:45:20.258Z
Reserved: 2023-10-16T17:51:35.571Z
Link: CVE-2023-46122
Updated: 2024-08-02T20:37:39.266Z
Status : Modified
Published: 2023-10-23T16:15:09.383
Modified: 2024-11-21T08:27:55.507
Link: CVE-2023-46122
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA