Vulnerability identifier: #VU21275
Vulnerability risk: Low
CVSSv3.1: 2.8 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
file-roller
Client/Desktop applications /
Software for archiving
Vendor: Gnome Development Team
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to the affected software allows a single path traversal sequence to be present in the TAR file name. A remote attacker can send a specially crafted archive and overwrite arbitrary files located one directory above the current file location.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
file-roller: 2.0.0 - 3.32.2
External links
http://bugzilla.gnome.org/show_bug.cgi?id=794337
http://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
http://gitlab.gnome.org/GNOME/file-roller/commit/e8fb3e24dae711e4fb0d6777e0016cdda8787bc1
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.