CVE-2018-1002200

plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Configurations

Configuration 1 (hide)

cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:40

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:1836 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1836 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1837 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1837 - Third Party Advisory
References () https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8 - Issue Tracking, Patch, Third Party Advisory () https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/codehaus-plexus/plexus-archiver/pull/87 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/codehaus-plexus/plexus-archiver/pull/87 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/snyk/zip-slip-vulnerability - Exploit, Issue Tracking, Third Party Advisory () https://github.com/snyk/zip-slip-vulnerability - Exploit, Issue Tracking, Third Party Advisory
References () https://snyk.io/research/zip-slip-vulnerability - Exploit, Third Party Advisory () https://snyk.io/research/zip-slip-vulnerability - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680 - Exploit, Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4227 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4227 - Third Party Advisory

02 Aug 2023, 16:17

Type Values Removed Values Added
CPE cpe:2.3:a:plexus-archiver_project:plexus-archiver:*:*:*:*:*:*:*:* cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*
First Time Codehaus-plexus
Codehaus-plexus plexus-archiver

Information

Published : 2018-07-25 17:29

Updated : 2024-11-21 03:40


NVD link : CVE-2018-1002200

Mitre link : CVE-2018-1002200

CVE.ORG link : CVE-2018-1002200


JSON object : View

Products Affected

debian

  • debian_linux

codehaus-plexus

  • plexus-archiver

redhat

  • enterprise_linux
  • enterprise_linux_workstation
  • enterprise_linux_desktop
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')