| Vulnerability Name: | CVE-2018-100554 (CCN-150629) | ||||||
| Published: | 2018-06-15 | ||||||
| Updated: | 2018-06-15 | ||||||
| Summary: | Ruby gem rubyzip could allow a remote attacker to traverse directories on the system. By persuading a victim to extract a specially-crafted ZIP archive containing "dot dot slash" sequences (../), an attacker could exploit this vulnerability to write to arbitrary files on the system.
Note: This vulnerability is known as "Zip-Slip" | ||||||
| CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) 4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||
| CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:C/A:N)
| ||||||
| Vulnerability Consequences: | Gain Access | ||||||
| References: | Source: MITRE Type: CNA CVE-2018-100554 Source: XF Type: UNKNOWN rubyzip-cve2018100554-dir-traversal(150629) Source: CCN Type: rubyzip GIT Repository Fix CVE-2018-1000544 #371 Source: CCN Type: Snyk Web site GitHub - snyk/zip-slip-vulnerability: Zip Slip Vulnerability (Arbitrary file write through archive extraction) Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-10055 | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||