Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWg3NGotNjkyZy00OG1x

Path Traversal in MHolt Archiver

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

Specific Go Packages Affected

github.com/mholt/archiver/cmd/arc

Permalink: https://github.com/advisories/GHSA-h74j-692g-48mq
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWg3NGotNjkyZy00OG1x
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: 3 months ago


CVSS Score: 5.5
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Identifiers: GHSA-h74j-692g-48mq, CVE-2019-10743
References: Repository: https://github.com/mholt/archiver
Blast Radius: 17.8

Affected Packages

go:github.com/mholt/archiver
Dependent packages: 1,185
Dependent repositories: 1,724
Downloads:
Affected Version Ranges: >= 3.0.0, < 3.3.2
Fixed in: 3.3.2
All affected versions: 3.0.0, 3.0.1, 3.1.0, 3.1.1
All unaffected versions: 1.1.1, 1.1.2, 2.0.0, 2.1.0