Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-50255
HistoryDec 27, 2023 - 4:16 p.m.

CVE-2023-50255 Zip Path Traversal in Deepin-Compressor

2023-12-2716:16:51
CWE-23
CWE-26
CWE-22
GitHub_M
www.cve.org
deepin-compressor
path traversal
cve-2023-50255
deepin linux os
remote command execution
update

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.2%

Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there’s a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "linuxdeepin",
    "product": "developer-center",
    "versions": [
      {
        "version": "< 5.12.21",
        "status": "affected"
      }
    ]
  }
]

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.2%

Related for CVELIST:CVE-2023-50255