CVE-2017-5946

The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-02-27 07:59

Updated : 2024-02-04 19:11


NVD link : CVE-2017-5946

Mitre link : CVE-2017-5946

CVE.ORG link : CVE-2017-5946


JSON object : View

Products Affected

rubyzip_project

  • rubyzip

debian

  • debian_linux
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')