First published: Mon Jul 24 2023(Updated: )
A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element. <a href="https://gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3">https://gitlab.gnome.org/GNOME/librsvg/-/releases/2.56.3</a> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213502">https://bugzilla.suse.com/show_bug.cgi?id=1213502</a> <a href="https://gitlab.gnome.org/GNOME/librsvg/-/issues/996">https://gitlab.gnome.org/GNOME/librsvg/-/issues/996</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Librsvg2 | <2.56.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2224945 is considered to be high due to the potential for file disclosure vulnerabilities.
To fix REDHAT-BUG-2224945, update librsvg to version 2.56.3 or later.
The REDHAT-BUG-2224945 vulnerability is caused by a directory traversal issue in the URL decoder of librsvg.
Users of GNOME librsvg versions prior to 2.56.3 are affected by REDHAT-BUG-2224945.
Yes, REDHAT-BUG-2224945 can be exploited by remote attackers to disclose files from the local filesystem.