The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-846-1 libzip-ruby security update
Debian DSA Debian DSA DSA-3801-1 ruby-zip security update
EUVD EUVD EUVD-2017-0236 The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Github GHSA Github GHSA GHSA-gcqq-w6gr-h9j9 Directory traversal vulnerability in RubyZip
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:18:49.419Z

Reserved: 2017-02-09T00:00:00

Link: CVE-2017-5946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-02-27T07:59:00.317

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-5946

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-02-04T00:00:00Z

Links: CVE-2017-5946 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses