Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.
An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
References
Configurations
No configuration.
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.nozominetworks.com/NN-2023:16-01 - |
28 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-15 17:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5938
Mitre link : CVE-2023-5938
CVE.ORG link : CVE-2023-5938
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')