Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1oY3hxLXg3N3EtMzQ2Oc4AARRs
Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Permalink: https://github.com/advisories/GHSA-hcxq-x77q-3469JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oY3hxLXg3N3EtMzQ2Oc4AARRs
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: almost 2 years ago
CVSS Score: 5.5
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Identifiers: GHSA-hcxq-x77q-3469, CVE-2018-1002200
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1002200
- https://github.com/codehaus-plexus/plexus-archiver/pull/87
- https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8
- https://access.redhat.com/errata/RHSA-2018:1836
- https://access.redhat.com/errata/RHSA-2018:1837
- https://github.com/snyk/zip-slip-vulnerability
- https://snyk.io/research/zip-slip-vulnerability
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680
- https://www.debian.org/security/2018/dsa-4227
- https://github.com/advisories/GHSA-hcxq-x77q-3469
Blast Radius: 19.4
Affected Packages
maven:org.codehaus.plexus:plexus-archiver
Dependent packages: 551Dependent repositories: 3,419
Downloads:
Affected Version Ranges: < 3.6.0
Fixed in: 3.6.0
All affected versions: 2.0.1, 2.0.2, 2.1.1, 2.1.2, 2.4.1, 2.4.3, 2.4.4, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.7.1, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.9.1, 2.10.1, 2.10.2, 2.10.3, 3.0.1, 3.0.2, 3.0.3, 3.1.1, 3.4.1
All unaffected versions: 3.6.0, 3.7.0, 4.0.0, 4.1.0, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.5, 4.2.6, 4.2.7, 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, 4.6.2, 4.6.3, 4.7.0, 4.7.1, 4.8.0, 4.9.0, 4.9.1, 4.9.2, 4.10.0