CVE-2018-1002200: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’.
References
- access.redhat.com/errata/RHSA-2018:1836
- access.redhat.com/errata/RHSA-2018:1837
- github.com/advisories/GHSA-hcxq-x77q-3469
- github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8
- github.com/codehaus-plexus/plexus-archiver/pull/87
- github.com/snyk/zip-slip-vulnerability
- nvd.nist.gov/vuln/detail/CVE-2018-1002200
- snyk.io/research/zip-slip-vulnerability
- snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680
- www.debian.org/security/2018/dsa-4227
Detect and mitigate CVE-2018-1002200 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →