CVE-2017-17715

The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak.
References
Link Resource
https://bugs.chromium.org/p/project-zero/issues/detail?id=1470 Issue Tracking Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1470 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:telegram:telegram_messenger:*:*:*:*:*:android:*:*

History

21 Nov 2024, 03:18

Type Values Removed Values Added
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1470 - Issue Tracking, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1470 - Issue Tracking, Third Party Advisory

Information

Published : 2017-12-16 19:29

Updated : 2024-11-21 03:18


NVD link : CVE-2017-17715

Mitre link : CVE-2017-17715

CVE.ORG link : CVE-2017-17715


JSON object : View

Products Affected

telegram

  • telegram_messenger
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')