CVE-2015-2060
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
29/11/2019
Last modified:
26/04/2021
Description
cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:* | 1.6 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151145.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151147.html
- http://www.cabextract.org.uk/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A064
- http://www.openwall.com/lists/oss-security/2015/02/18/3
- http://www.openwall.com/lists/oss-security/2015/02/23/16
- http://www.openwall.com/lists/oss-security/2015/02/23/24



