GHSA-h74j-692g-48mq

Suggest an improvement
Source
https://github.com/advisories/GHSA-h74j-692g-48mq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-h74j-692g-48mq/GHSA-h74j-692g-48mq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-h74j-692g-48mq
Aliases
Published
2021-05-18T15:31:53Z
Modified
2025-01-14T07:56:51.026896Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Path Traversal in MHolt Archiver
Details

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

Specific Go Packages Affected

github.com/mholt/archiver/cmd/arc

Database specific
{
    "nvd_published_at": "2019-10-29T19:15:16Z",
    "cwe_ids": [
        "CWE-22",
        "CWE-29"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-17T21:21:43Z"
}
References

Affected packages

Go / github.com/mholt/archiver

Package

Name
github.com/mholt/archiver
View open source insights on deps.dev
Purl
pkg:golang/github.com/mholt/archiver

Affected ranges

Type
SEMVER
Events
Introduced
3.0.0
Fixed
3.3.2