okular version 18.08 and earlier contains a Directory Traversal vulnerability in function "unpackDocumentArchive(...)" in "core/document.cpp" that can result in Arbitrary file creation on the user workstation. This attack appear to be exploitable via he victim must open a specially crafted Okular archive. This issue appears to have been corrected in version 18.08.1
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/09/msg00027.html | third party advisory mailing list |
https://cgit.kde.org/okular.git/commit/?id=8ff7abc14d41906ad978b6bc67e69693863b9d47 | third party advisory patch |
https://security.gentoo.org/glsa/201811-08 | third party advisory vendor advisory |
https://bugs.kde.org/show_bug.cgi?id=398096 | issue tracking patch exploit third party advisory |
https://www.debian.org/security/2018/dsa-4303 | third party advisory vendor advisory |