CVE-2017-5946

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3801 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3801 - Third Party Advisory
References () http://www.securityfocus.com/bid/96445 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96445 - Third Party Advisory, VDB Entry
References () https://github.com/rubyzip/rubyzip/issues/315 - Third Party Advisory () https://github.com/rubyzip/rubyzip/issues/315 - Third Party Advisory
References () https://github.com/rubyzip/rubyzip/releases - Third Party Advisory () https://github.com/rubyzip/rubyzip/releases - Third Party Advisory

Information

Published : 2017-02-27 07:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5946

Mitre link : CVE-2017-5946

CVE.ORG link : CVE-2017-5946


JSON object : View

Products Affected

debian

  • debian_linux

rubyzip_project

  • rubyzip
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')