Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45502
HistoryFeb 16, 2024 - 9:14 p.m.

Path Traversal

2024-02-1621:14:11
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
8
engrampa
software
path traversal
symlink
vulnerability
user input
cpio archives
symlink location
arbitrary file writes
unintended locations
malicious archive
execution
arbitrary commands

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.9%

engrampa is vulneravle to Path Traversal. The vulnerability occurs an application does not properly validate or sanitize user input during the handling of CPIO archives which does not adequately check the symlink location. It allows an attacker arbitrary file writes to unintended locations and can craft a malicious CPIO or ISO archive to take advantage of the symlink handling issue during extraction, leading to the execution of arbitrary commands on the target system.

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.9%