First published: Thu Jan 23 2025(Updated: )
Fedora Repository 3.8.1 allows path traversal when extracting uploaded archives ("Zip Slip"). A remote, authenticated attacker can upload a specially crafted archive that will extract an arbitrary JSP file to a location that can be executed by an unauthenticated GET request. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23).
Credit: 9119a7d8-5eab-497f-8521-727c672e3725
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora Repository | =3.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23011 is considered a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2025-23011, update your Fedora Repository to version 3.8.2 or later.
CVE-2025-23011 allows remote authenticated attackers to exploit path traversal vulnerabilities through maliciously crafted archives.
CVE-2025-23011 affects Fedora Repository version 3.8.1.
CVE-2025-23011 can allow extraction of arbitrary JSP files to executable locations.