CVE-2019-10743Path Traversal in Mholt Archiver

Severity
5.5MEDIUMNVD
EPSS
1.2%
top 20.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 29
Latest updateMay 18

Description

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a co

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Gogithub.com/mholt_archiver3.0.03.3.2
NVDarchiver_project/archiver3.0.03.3.2
CVEListV5archiver_project/archiverAll versions

🔴Vulnerability Details

3
GHSA
Path Traversal in MHolt Archiver2021-05-18
OSV
Path Traversal in MHolt Archiver2021-05-18
CVEList
CVE-2019-10743: All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions2019-10-28

📋Vendor Advisories

2
Red Hat
hostapd: Not preventig the use of low quality PRNG in EAP mode leads to insufficient entropy2020-02-27
Red Hat
mholt/archiver: aribtrary file write via unsanitized destination filepaths2019-05-12

💬Community

2
Bugzilla
CVE-2016-10743 hostapd: Not preventig the use of low quality PRNG leads to insufficient entropy2020-03-06
Bugzilla
CVE-2019-10064 hostapd: Not preventig the use of low quality PRNG in EAP mode leads to insufficient entropy2020-03-06
CVE-2019-10743 — Path Traversal in Mholt Archiver | cvebase