Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12dzgzLWgzbXEtM3F3as00EA
Path Traversal in Spring-integration-zip
Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
Permalink: https://github.com/advisories/GHSA-vw83-h3mq-3qwjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12dzgzLWgzbXEtM3F3as00EA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: about 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-vw83-h3mq-3qwj, CVE-2021-22114
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-22114
- https://tanzu.vmware.com/security/cve-2021-22114
- https://github.com/advisories/GHSA-vw83-h3mq-3qwj
Affected Packages
maven:org.springframework.integration:spring-integration-zip
Dependent packages: 3Dependent repositories: 8
Downloads:
Affected Version Ranges: < 1.0.4
Fixed in: 1.0.4
All affected versions:
All unaffected versions: 2.0.0, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4