CVE-2017-1000472Path Traversal in Poco

CWE-22Path Traversal6 documents6 sources
Severity
6.5MEDIUMNVD
EPSS
0.5%
top 35.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 3
Latest updateMay 14

Description

The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "file path injection vulnerability".

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDpocoproject/poco< 1.8
Debianpocoproject/poco< 1.8.0-2+3

Also affects: Debian Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-46gc-5p3g-hwvg: The ZipCommon::isValidPath() function in Zip/src/ZipCommon2022-05-14
CVEList
CVE-2017-1000472: The ZipCommon::isValidPath() function in Zip/src/ZipCommon2018-01-03
OSV
CVE-2017-1000472: The ZipCommon::isValidPath() function in Zip/src/ZipCommon2018-01-03

📋Vendor Advisories

1
Debian
CVE-2017-1000472: poco - The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libra...2017

💬Community

1
Bugzilla
poco: Improper path restriction in ZipCommon.cpp allows for arbitrary files to be written2018-01-08
CVE-2017-1000472 — Path Traversal in Pocoproject Poco | cvebase