GHSA-mm6g-mmq6-53ff

Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-mm6g-mmq6-53ff/GHSA-mm6g-mmq6-53ff.json
Aliases
  • CVE-2021-32842
Published
2022-02-01T16:23:00Z
Modified
2022-08-15T07:56:59.170751Z
Details

SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that _baseDirectory ends with slash. If the _baseDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.

References

Affected packages

NuGet / SharpZipLib

SharpZipLib

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0
Fixed
1.3.3

Affected versions

1.*

1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.3.2