Sigil before 0.9.16 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505967936 | third party advisory |
https://github.com/Sigil-Ebook/flightcrew/issues/52#issuecomment-505997355 | third party advisory |
https://github.com/Sigil-Ebook/Sigil/commit/369eebe936e4a8c83cc54662a3412ce8bef189e4 | third party advisory patch |
https://github.com/Sigil-Ebook/Sigil/commit/04e2f280cc4a0766bedcc7b9eb56449ceecc2ad4 | third party advisory patch |
https://github.com/Sigil-Ebook/Sigil/commit/0979ba8d10c96ebca330715bfd4494ea0e019a8f | third party advisory patch |
https://github.com/Sigil-Ebook/Sigil/releases/tag/0.9.16 | third party advisory release notes |
https://github.com/Sigil-Ebook/Sigil/compare/ea7f27d...5b867e5 | third party advisory |
https://usn.ubuntu.com/4085-1/ | third party advisory vendor advisory |
https://salvatoresecurity.com/zip-slip-in-sigil-cve-2019-14452/ |