-
Notifications
You must be signed in to change notification settings - Fork 314
Directory traversal vulnerability #315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@ecneladis thank you for your report. I will review it tomorrow and will try to fix. |
Since this is a significant vulnerability, I have assigned a CVE ID to this issue. |
dentarg
added a commit
to dentarg/extensionator
that referenced
this issue
Mar 2, 2017
rubyzip v1.2.1 fixes a security vulnerability: rubyzip/rubyzip#315 See https://github.com/rubyzip/rubyzip/releases/tag/v1.2.1 for additional changes.
amatriain
added a commit
to amatriain/feedbunch
that referenced
this issue
Mar 6, 2017
This fixes a directory traversal vulnerability, see rubyzip/rubyzip#315
TrevorBramble
added a commit
to cwebberOps/restforce-bulk
that referenced
this issue
Mar 8, 2017
There is a [published security vulnerability](rubyzip/rubyzip#315) in rubyzip that requires upgrading it, but the prior version constraint did not allow updating minor versions. This change raises the minimum version of rubyzip to include the vulnerability patch and drops the patch version from the constraint to allow minor version updates.
joshpencheon
pushed a commit
to NHSDigital/ndr_import
that referenced
this issue
Mar 8, 2017
joshpencheon
pushed a commit
to NHSDigital/ndr_import
that referenced
this issue
Mar 8, 2017
aliuk2012
pushed a commit
to ministryofjustice/correspondence_tool_public
that referenced
this issue
Mar 24, 2017
Code Climate identified a security flaw with a gem our service was using. Code Climate Notice: Advisory: CVE-2017-5946 URL: rubyzip/rubyzip#315 Solution: upgrade to >= 1.2.1
aliuk2012
pushed a commit
to ministryofjustice/correspondence_tool_public
that referenced
this issue
Mar 24, 2017
Code Climate identified a security flaw with a gem our service was using. Code Climate Notice: Advisory: CVE-2017-5946 URL: rubyzip/rubyzip#315 Solution: upgrade to >= 1.2.1
This was referenced Mar 27, 2017
rap1ds
added a commit
to sharetribe/sharetribe
that referenced
this issue
Apr 21, 2017
rakvium
added a commit
to rakvium/blog
that referenced
this issue
Oct 4, 2017
Name: rubyzip Version: 0.9.9 Advisory: CVE-2017-5946 Criticality: Unknown URL: rubyzip/rubyzip#315 Title: Directory traversal vulnerability in rubyzip Solution: upgrade to >= 1.2.1
PratheepV
added a commit
to PratheepV/docx
that referenced
this issue
Nov 1, 2017
Upgrading rubyzip for rubyzip/rubyzip#315
1 task
joshpencheon
pushed a commit
to NHSDigital/ndr_import
that referenced
this issue
Mar 12, 2018
4 tasks
niedfelj
pushed a commit
to niedfelj/qualtrics
that referenced
this issue
Jun 2, 2020
Fixes RubyZip vulnerability There was a vulnerability found in `rubyzip` gem ([github issue](rubyzip/rubyzip#315)). This was fixed by updated the dependency to version `1.2.1` which fixes the vulnerability. See merge request !1
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Overview
Rubyzip module allows to overwrite or create arbitrary files via relative filenames and thus executing malicious code, e.g. by writing to /etc/ld.so.preload, ~/.bashrc etc.
Proof of concept:
rubyzip_test_traversal.rb:
Vulnerable version and test environment
Analogous vulnerability in minitar gem: halostatue/minitar#16
The text was updated successfully, but these errors were encountered: