GHSA-mm6g-mmq6-53ff

Suggest an improvement
Source
https://github.com/advisories/GHSA-mm6g-mmq6-53ff
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-mm6g-mmq6-53ff/GHSA-mm6g-mmq6-53ff.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mm6g-mmq6-53ff
Aliases
Published
2022-02-01T16:23:00Z
Modified
2024-02-19T05:31:55.120019Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Path Traversal in SharpZipLib
Details

SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that _baseDirectory ends with slash. If the _baseDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.

References

Affected packages

NuGet / SharpZipLib

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.0.0
Fixed
1.3.3

Affected versions

1.*

1.0.0
1.1.0
1.2.0
1.3.0
1.3.1
1.3.2