Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.



An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58210 Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks. An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
Fixes

Solution

Upgrade to v1.6.0 or later.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-08-02T08:14:25.135Z

Reserved: 2023-11-02T15:59:53.213Z

Link: CVE-2023-5938

cve-icon Vulnrichment

Updated: 2024-08-02T08:14:25.135Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-15T17:15:09.733

Modified: 2024-11-21T08:42:49.100

Link: CVE-2023-5938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.