First published: Wed May 30 2018(Updated: )
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
debian/plexus-archiver | 3.6.0-2 4.6.1-1 | |
debian/plexus-archiver | <=3.5-1<=1.2-1 | 3.6.0-1 1.2-1+deb8u1 2.2-1+deb9u1 |
redhat/plexus-archiver | <3.6.0 | 3.6.0 |
Codehaus-plexus Plexus-archiver | <3.6.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Red Hat Enterprise Linux | =7.5 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1002200 is classified as a medium severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2018-1002200, upgrade plexus-archiver to version 3.6.0 or later.
CVE-2018-1002200 affects all versions of plexus-archiver prior to 3.6.0.
CVE-2018-1002200 allows attackers to exploit directory traversal vulnerabilities leading to the potential write of files outside the target directory.
There are no specific workarounds for CVE-2018-1002200 other than upgrading to the patched version.