|
Message-ID: <87a657nflj.fsf@v45346.1blu.de> Date: Fri, 04 Nov 2022 12:06:48 +0100 From: Stefan Bodewig <bodewig@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-37865: Apache Ivy allow create/overwrite any file on the system -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Severity: medium Description: With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used pack200 or zip packaging. For artifacts using the "zip", "jar" or "war" packaging Ivy prior to 2.5.1 doesn't verify the target path when extracting the archive. An archive containing absolute paths or paths that try to traverse "upwards" using ".." sequences can then write files to any location on the local fie system that the user executing Ivy has write access to. Mitigation: Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1. Credit: This issue was discovered by Kostya Kortchinsky of the Databricks Security Team. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAmNk8kgACgkQohFa4V9ri3IqkQCfQujcSRYhjtUmvl7GuyYn46cc f9MAn2ZSD7dzeAn9kPK+QqYH6gbH4F0e =jVS7 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.