Description
All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h74j-692g-48mq | Path Traversal in MHolt Archiver |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:01.212Z
Reserved: 2019-04-03T00:00:00.000Z
Link: CVE-2019-10743
No data.
Status : Modified
Published: 2019-10-29T19:15:16.610
Modified: 2024-11-21T04:19:50.003
Link: CVE-2019-10743
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA