CVE-2018-10862

CWE-22Path Traversal8 documents6 sources
Severity
5.5MEDIUM
EPSS
0.3%
top 46.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 27
Latest updateMay 14

Description

WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

🔴Vulnerability Details

3
OSV
Improper Limitation of a Pathname to a Restricted Directory in WildFly2022-05-14
GHSA
Improper Limitation of a Pathname to a Restricted Directory in WildFly2022-05-14
CVEList
CVE-2018-10862: WildFly Core before version 62018-07-27

📋Vendor Advisories

1
Red Hat
wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)2018-06-21

💬Community

3
Bugzilla
CVE-2018-10862 wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) [fedora-all]2018-06-25
Bugzilla
CVE-2018-10862 wildfly-common: wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) [epel-7]2018-06-25
Bugzilla
CVE-2018-10862 wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)2018-06-21
CVE-2018-10862 (MEDIUM CVSS 5.5) | WildFly Core before version 6.0.0.A | cvebase.io