logo

CVE-2019-10743 github.com/mholt/archiver

Package

Manager: go
Name: github.com/mholt/archiver
Vulnerable Version: >=3.0.0 <3.3.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0095 pctl0.75472

Details

Path Traversal in MHolt Archiver All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily. ### Specific Go Packages Affected github.com/mholt/archiver/cmd/arc

Metadata

Created: 2021-05-18T15:31:53Z
Modified: 2024-02-13T16:32:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-h74j-692g-48mq/GHSA-h74j-692g-48mq.json
CWE IDs: ["CWE-22", "CWE-29"]
Alternative ID: GHSA-h74j-692g-48mq
Finding: F063
Auto approve: 1