GHSA-pqcf-v8v5-jmcg

Suggest an improvement
Source
https://github.com/advisories/GHSA-pqcf-v8v5-jmcg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-pqcf-v8v5-jmcg/GHSA-pqcf-v8v5-jmcg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pqcf-v8v5-jmcg
Aliases
Published
2022-02-10T22:23:18Z
Modified
2023-11-08T04:03:25.135943Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Zip slip in Microweber
Details

A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.

Database specific
{
    "nvd_published_at": "2021-02-15T20:15:00Z",
    "github_reviewed_at": "2021-05-07T21:58:37Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Packagist / microweber/microweber

Package

Name
microweber/microweber
Purl
pkg:composer/microweber/microweber

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.3

Affected versions

0.*

0.9.346
0.93
0.931
0.934
0.951

1.*

1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.1