CVE-2019-10743 – github.com/mholt/archiver
Package
Manager: go
Name: github.com/mholt/archiver
Vulnerable Version: >=3.0.0 <3.3.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0095 pctl0.75472
Details
Path Traversal in MHolt Archiver All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily. ### Specific Go Packages Affected github.com/mholt/archiver/cmd/arc
Metadata
Created: 2021-05-18T15:31:53Z
Modified: 2024-02-13T16:32:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-h74j-692g-48mq/GHSA-h74j-692g-48mq.json
CWE IDs: ["CWE-22", "CWE-29"]
Alternative ID: GHSA-h74j-692g-48mq
Finding: F063
Auto approve: 1