Directory Traversal exists in RAR 4.x and 5.x because an unpack operation follows any symlinks, including symlinks contained in the archive. This allows remote attackers to write to arbitrary files via a crafted archive.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172 | Exploit Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774172 - Exploit, Third Party Advisory |
Information
Published : 2017-06-04 23:29
Updated : 2024-11-21 02:22
NVD link : CVE-2014-9983
Mitre link : CVE-2014-9983
CVE.ORG link : CVE-2014-9983
JSON object : View
Products Affected
rarlab
- rar
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')