The Zip::File
component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses ../
pathname substrings to write arbitrary files to the filesystem.
www.debian.org/security/2017/dsa-3801
github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2017-5946.yml
github.com/rubyzip/rubyzip
github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016
github.com/rubyzip/rubyzip/issues/315
github.com/rubyzip/rubyzip/releases
nvd.nist.gov/vuln/detail/CVE-2017-5946
web.archive.org/web/20200227185727/www.securityfocus.com/bid/96445