SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.
References
Link | Resource |
---|---|
https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3 | Release Notes Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/ | Exploit Third Party Advisory |
https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3 | Release Notes Third Party Advisory |
https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3 - Release Notes, Third Party Advisory | |
References | () https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.0 |
Information
Published : 2022-01-26 21:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32842
Mitre link : CVE-2021-32842
CVE.ORG link : CVE-2021-32842
JSON object : View
Products Affected
sharpziplib_project
- sharpziplib
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')