Ausführen beliebiger Kommandos in plexus-archiver
ID: | FEDORA-2018-6c55e1f79c |
Distribution: | Fedora |
Plattformen: | Fedora 27 |
Datum: | Do, 14. Juni 2018, 22:52 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002200 |
Applikationen: | plexus-archiver |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2018-6c55e1f79c 2018-06-14 18:14:18.568902 -------------------------------------------------------------------------------- Name : plexus-archiver Product : Fedora 27 Version : 3.4 Release : 4.fc27 URL : http://codehaus-plexus.github.io/plexus-archiver Summary : Plexus Archiver Component Description : The Plexus project seeks to create end-to-end developer tools for writing applications. At the core is the container, which can be embedded or for a full scale application server. There are many reusable components for hibernate, form processing, jndi, i18n, velocity, etc. Plexus also includes an application server which is like a J2EE application server, without all the baggage. -------------------------------------------------------------------------------- Update Information: Security fix: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200) A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations. Red Hat would like to thank Danny Grander (Snyk) for reporting this issue. External References: https://snyk.io/research/zip-slip-vulnerability -------------------------------------------------------------------------------- ChangeLog: * Fri Jun 1 2018 Mikolaj Izdebski |