Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBxY2Ytdjh2NS1qbWNn
Zip slip in Microweber
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
Permalink: https://github.com/advisories/GHSA-pqcf-v8v5-jmcgJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBxY2Ytdjh2NS1qbWNn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 4 months ago
CVSS Score: 7.2
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-pqcf-v8v5-jmcg, CVE-2020-28337
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-28337
- https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50
- https://sl1nki.page/advisories/CVE-2020-28337
- https://sl1nki.page/blog/2021/02/01/microweber-zip-slip
- http://packetstormsecurity.com/files/162514/Microweber-CMS-1.1.20-Remote-Code-Execution.html
- https://github.com/advisories/GHSA-pqcf-v8v5-jmcg
Affected Packages
packagist:microweber/microweber
Versions: < 1.2.3Fixed in: 1.2.3