#VU21275 Path traversal in file-roller


Published: 2019-09-23

Vulnerability identifier: #VU21275

Vulnerability risk: Low

CVSSv3.1: 2.8 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-16680

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
file-roller
Client/Desktop applications / Software for archiving

Vendor: Gnome Development Team

Description
The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to the affected software allows a single path traversal sequence to be present in the TAR file name. A remote attacker can send a specially crafted archive and overwrite arbitrary files located one directory above the current file location.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

file-roller: 2.0.0 - 3.32.2


External links
http://bugzilla.gnome.org/show_bug.cgi?id=794337
http://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
http://gitlab.gnome.org/GNOME/file-roller/commit/e8fb3e24dae711e4fb0d6777e0016cdda8787bc1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability