First published: Wed Nov 15 2023(Updated: )
A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Cpio | ||
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7216 is classified as a medium severity vulnerability due to its potential for unauthorized access.
To fix CVE-2023-7216, update the GNU cpio package to the latest version available from your distribution.
CVE-2023-7216 affects GNU cpio and Red Hat Enterprise Linux versions 7.0, 8.0, and 9.0.
Yes, CVE-2023-7216 can be exploited by a remote unauthenticated attacker if users open affected archives.
CVE-2023-7216 is a path traversal vulnerability that allows symlink access outside intended directories.