An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.
References
Link | Resource |
---|---|
https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-38346 | Patch Vendor Advisory |
https://support2.windriver.com/index.php?page=security-notices | Vendor Advisory |
https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ | Exploit Technical Description Third Party Advisory |
https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-38346 | Patch Vendor Advisory |
https://support2.windriver.com/index.php?page=security-notices | Vendor Advisory |
https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-38346 - Patch, Vendor Advisory | |
References | () https://support2.windriver.com/index.php?page=security-notices - Vendor Advisory | |
References | () https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ - Exploit, Technical Description, Third Party Advisory |
26 Sep 2023, 14:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:windriver:vxworks:7.0:-:*:*:*:*:*:* cpe:2.3:o:windriver:vxworks:6.9:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Windriver
Windriver vxworks |
|
CWE | CWE-22 | |
References | (MISC) https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-38346 - Patch, Vendor Advisory | |
References | (MISC) https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/ - Exploit, Technical Description, Third Party Advisory | |
References | (MISC) https://support2.windriver.com/index.php?page=security-notices - Vendor Advisory |
22 Sep 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-22 19:15
Updated : 2024-11-21 08:13
NVD link : CVE-2023-38346
Mitre link : CVE-2023-38346
CVE.ORG link : CVE-2023-38346
JSON object : View
Products Affected
windriver
- vxworks
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')