Vulnerability identifier: #VU13540
Vulnerability risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Apache Storm
Server applications /
Other server solutions
Vendor: Apache Foundation
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to path traversal when handling malicious input. A remote attacker can use a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z) that holds path traversal filenames, conduct directory traversal attack and write arbitrary files in the system.
Mitigation
The vulnerability is addressed in the versions 1.1.3, 1.2.2.
Vulnerable software versions
Apache Storm: 1.0.0 - 1.2.1, 0.9.1 - 0.10.0
External links
http://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58@%3Cdev...
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.