CVE-2017-5946
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
27/02/2017
Last modified:
20/04/2025
Description
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:ruby:*:* | 1.2.1 (excluding) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2017/dsa-3801
- http://www.securityfocus.com/bid/96445
- https://github.com/rubyzip/rubyzip/issues/315
- https://github.com/rubyzip/rubyzip/releases
- http://www.debian.org/security/2017/dsa-3801
- http://www.securityfocus.com/bid/96445
- https://github.com/rubyzip/rubyzip/issues/315
- https://github.com/rubyzip/rubyzip/releases



