| ID |
CVE-2019-10743
|
| Sažetak |
All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily. |
| Reference |
|
| CVSS |
| Base: | 5.8 |
| Impact: | 4.9 |
| Exploitability: | 8.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
PARTIAL |
PARTIAL |
|
| CVSS vektor |
AV:N/AC:M/Au:N/C:N/I:P/A:P |
| Zadnje važnije ažuriranje |
02-02-2024 - 02:13 |
| Objavljeno |
29-10-2019 - 19:15 |