Description
Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.



An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
Published: 2024-05-15
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to v1.6.0 or later.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-58210 Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks. An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-08-02T08:14:25.135Z

Reserved: 2023-11-02T15:59:53.213Z

Link: CVE-2023-5938

cve-icon Vulnrichment

Updated: 2024-08-02T08:14:25.135Z

cve-icon NVD

Status : Deferred

Published: 2024-05-15T17:15:09.733

Modified: 2026-04-15T00:35:42.020

Link: CVE-2023-5938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses