Lucene search

K
cvelistRedhatCVELIST:CVE-2024-0406
HistoryApr 06, 2024 - 4:11 p.m.

CVE-2024-0406 Mholt/archiver: path traversal vulnerability

2024-04-0616:11:02
CWE-22
redhat
www.cve.org
1
mholt/archiver
path traversal
crafted tar files
restricted access
overwrite files
library vulnerability

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user’s or application’s privileges using the library.

CNA Affected

[
  {
    "versions": [
      {
        "status": "affected",
        "version": "v3.0.0",
        "lessThan": "*",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "v4.0.0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "packageName": "archiver",
    "collectionURL": "https://github.com/mholt/archiver",
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 3",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-main-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:3"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 3",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-roxctl-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:3"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 3",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-scanner-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:3"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-main-rhel8",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:4"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-roxctl-rhel8",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:4"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Advanced Cluster Security 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "advanced-cluster-security/rhacs-scanner-rhel8",
    "defaultStatus": "unaffected",
    "cpes": [
      "cpe:/a:redhat:advanced_cluster_security:4"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat OpenShift Container Platform 4",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "openshift4/oc-mirror-plugin-rhel8",
    "defaultStatus": "affected",
    "cpes": [
      "cpe:/a:redhat:openshift:4"
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for CVELIST:CVE-2024-0406