File Roller Path Traversal

2013.07.09
Credit: Yorick Koster
Risk: Low
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

#2013-001 File Roller path sanitization errors Description: The File Roller archive manager for the GNOME desktop suffers from a path traversal vulnerability caused by insufficient path sanitization. A specially crafted archive file can be used to trigger creation of arbitrary files in any location, writable by the user executing the extraction, outside the current working directory. This behaviour is triggered when the option 'Keep directory structure' is selected from the application 'Extract' dialog. The issue is present on File Roller installations which have been compiled with libarchive support, used to handle tar, cpio, lha, 7zip, ar archiving formats and ISO images. The libarchive support is enabled by default. Affected version: File Roller >= 3.6.0, >= 3.8.0, >= 3.9.1 Fixed version: File Roller >= 3.6.4, >= 3.8.3, >= 3.9.3 Credit: vulnerability report received from Yorick Koster <yorick.koster AT securify.nl> CVE: CVE-2013-4668 Timeline: 2013-05-16: vulnerability report received 2013-05-20: contacted File Roller maintainer 2013-05-27: maintainer provides patch for review 2013-05-28: reporter confirms patch effectiveness 2013-06-11: oCERT confirms patch effectiveness 2013-06-17: File Roller 3.9.3 released 2013-07-02: File Roller 3.6.4, 3.8.3 released 2013-07-04: contacted affected vendors 2013-07-04: assigned CVE 2013-07-08: advisory release References: http://fileroller.sourceforge.net http://git.gnome.org/browse/file-roller https://git.gnome.org/browse/file-roller/commit/?id=b147281293a8307808475e102a14857055f81631 Permalink: http://www.ocert.org/advisories/ocert-2013-001.html -- Daniele Bianco Open Source Computer Security Incident Response Team <danbia@ocert.org> http://www.ocert.org GPG Key 0x9544A497 GPG Key fingerprint = 88A7 43F4 F28F 1B9D 6F2D 4AC5 AE75 822E 9544 A497

References:

http://fileroller.sourceforge.net
http://git.gnome.org/browse/file-roller
https://git.gnome.org/browse/file-roller/commit/?id=b147281293a8307808475e102a14857055f81631


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top