CVE-2023-50255

Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deepin:deepin-compressor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 9.3
References () https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 - Patch () https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 - Patch
References () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 - Exploit, Third Party Advisory () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 - Exploit, Third Party Advisory

04 Jan 2024, 17:03

Type Values Removed Values Added
CPE cpe:2.3:a:deepin:deepin-compressor:*:*:*:*:*:*:*:*
References () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 - () https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 - Exploit, Third Party Advisory
References () https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 - () https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Deepin
Deepin deepin-compressor

27 Dec 2023, 18:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-27 17:15

Updated : 2024-11-21 08:36


NVD link : CVE-2023-50255

Mitre link : CVE-2023-50255

CVE.ORG link : CVE-2023-50255


JSON object : View

Products Affected

deepin

  • deepin-compressor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal

CWE-26

Path Traversal: '/dir/../filename'