Vulnerability Name:

CVE-2018-100554 (CCN-150629)

Published:2018-06-15
Updated:2018-06-15
Summary:Ruby gem rubyzip could allow a remote attacker to traverse directories on the system. By persuading a victim to extract a specially-crafted ZIP archive containing "dot dot slash" sequences (../), an attacker could exploit this vulnerability to write to arbitrary files on the system.

Note: This vulnerability is known as "Zip-Slip"
CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-100554

Source: XF
Type: UNKNOWN
rubyzip-cve2018100554-dir-traversal(150629)

Source: CCN
Type: rubyzip GIT Repository
Fix CVE-2018-1000544 #371

Source: CCN
Type: Snyk Web site
GitHub - snyk/zip-slip-vulnerability: Zip Slip Vulnerability (Arbitrary file write through archive extraction)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2018-10055

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:rubyzip_project:rubyzip:1.2.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    rubyzip_project rubyzip 1.2.1