loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/Stuk/jszip/commit/2edab366119c9ee948357c02f1206c28566cdf15 | third party advisory patch |
https://www.mend.io/vulnerability-database/WS-2023-0004 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/244499 | vdb entry third party advisory |
https://github.com/Stuk/jszip/compare/v3.7.1...v3.8.0 | third party advisory |
https://security.netapp.com/advisory/ntap-20240621-0005/ |