Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1tbTZnLW1tcTYtNTNmZs0mqg

Path Traversal in SharpZipLib

SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that _baseDirectory ends with slash. If the _baseDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.

Permalink: https://github.com/advisories/GHSA-mm6g-mmq6-53ff
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tbTZnLW1tcTYtNTNmZs0mqg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: about 1 year ago


CVSS Score: 4.0
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Identifiers: GHSA-mm6g-mmq6-53ff, CVE-2021-32842
References: Repository: https://github.com/icsharpcode/SharpZipLib

Affected Packages

nuget:SharpZipLib
Dependent packages: 0
Dependent repositories: 0
Downloads: 169,748,569 total
Affected Version Ranges: >= 1.0.0, < 1.3.3
Fixed in: 1.3.3
All affected versions: 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.3.1, 1.3.2
All unaffected versions: 0.86.0, 1.3.3, 1.4.0, 1.4.1, 1.4.2