Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-23521
HistoryJan 31, 2022 - 12:00 a.m.

CVE-2021-23521

2022-01-3100:00:00
ubuntu.com
ubuntu.com
17

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

40.9%

This affects the package juce-framework/JUCE before 6.1.5. This
vulnerability is triggered when a malicious archive is crafted with an
entry containing a symbolic link. When extracted, the symbolic link is
followed outside of the target dir allowing writing arbitrary files on the
target host. In some cases, this can allow an attacker to execute arbitrary
code. The vulnerable code is in the ZipFile::uncompressEntry function in
juce_ZipFile.cpp and is executed when the archive is extracted upon calling
uncompressTo() on a ZipFile object.

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

40.9%

Related for UB:CVE-2021-23521