First published: Sun Jan 29 2023(Updated: )
A flaw was found in the JSZip package. Affected versions of JSZip could allow a remote attacker to traverse directories on the system caused by the failure to sanitize filenames when files are loaded with `loadAsync`, which makes the library vulnerable to a Zip Slip attack. By extracting files from a specially crafted archive, an attacker could gain access to parts of the file system outside of the target folder, overwrite the executable files, and execute arbitrary commands on the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jszip Project Jszip | <3.8.0 | |
redhat/jszip | <3.8.0 | 3.8.0 |
IBM Cognos Analytics | <=12.0 | |
IBM Cognos Analytics | <=11.2.x | |
IBM Cognos Analytics | <=11.1.x | |
npm/jszip | <3.8.0 | 3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-48285.
The title of this vulnerability is 'loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.'
The severity of CVE-2022-48285 is high.
CVE-2022-48285 affects JSZip by allowing a remote attacker to traverse directories on the system through a Zip Slip attack.
To fix CVE-2022-48285 in JSZip, update to version 3.8.0 or later.