CVE-2023-0591

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0591
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0591.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-0591
Aliases
Published
2023-01-31T10:15:10Z
Modified
2025-01-14T11:17:48.497995Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

ubireaderextractfiles is vulnerable to path traversal when run against specifically crafted UBIFS files, allowing the attacker to overwrite files outside of the extraction directory (provided the process has write access to that file or directory).

This is due to the fact that a node name (dentnode.name) is considered trusted and joined to the extraction directory path during processing, then the node content is written to that joined path. By crafting a malicious UBIFS file with node names holding path traversal payloads (e.g. ../../tmp/outside.txt), it's possible to force ubireader to write outside of the extraction directory.

This issue affects ubi-reader before 0.8.5.

References

Affected packages

Git / github.com/jrspruitt/ubi_reader

Affected ranges

Type
GIT
Repo
https://github.com/jrspruitt/ubi_reader
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.0-master
v0.6.2-master
v0.6.2-testing
v0.6.3-master
v0.7.1-master
v0.7.2-master
v0.8.0-master

Other

v1_ui
v2_ui