Vulnerability Name: | CVE-2015-2060 (CCN-172725) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-02-08 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2015-02-08 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2021-04-26 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-2060 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151145.html Source: MISC Type: Issue Tracking, Patch, Third Party Advisory http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151147.html Source: MISC Type: Vendor Advisory http://www.cabextract.org.uk/ Source: MISC Type: Broken Link http://www.mandriva.com/security/advisories?name=MDVSA-2015:064 Source: MISC Type: Exploit, Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/02/18/3 Source: MISC Type: Mailing List, Mitigation, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/02/23/16 Source: MISC Type: Mailing List, Mitigation, Third Party Advisory http://www.openwall.com/lists/oss-security/2015/02/23/24 Source: XF Type: UNKNOWN cabextract-cve20152060-dir-traversal(172725) Source: CCN Type: Cabextract Web site Free Software for extracting Microsoft cabinet files Source: CCN Type: oss-sec Mailing List, Wed, 18 Feb 2015 13:11:55 +0300 CVE Request: cabextract -- directory traversal Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-2060 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |