Skip to content

mixlib-archive Path Traversal vulnerability

High severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Mar 6, 2023

Package

bundler mixlib-archive (RubyGems)

Affected versions

< 0.4.0

Patched versions

0.4.0

Description

Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using .. in tar archive entries

References

Published by the National Vulnerability Database Jul 17, 2017
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jan 27, 2023
Last updated Mar 6, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2017-1000026

GHSA ID

GHSA-98wx-cw86-c97x

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.