rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://github.com/rubyzip/rubyzip/issues/369 | third party advisory exploit |
https://access.redhat.com/errata/RHSA-2018:3466 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html | third party advisory mailing list |