chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/kyz/libmspack/commit/7cadd489698be117c47efcadd742651594429e6d | vendor advisory exploit |
https://www.openwall.com/lists/oss-security/2018/10/22/1 | third party advisory mailing list |
https://bugs.debian.org/911639 | third party advisory mailing list |
https://security.gentoo.org/glsa/201903-20 | third party advisory vendor advisory |