cve/2022/CVE-2022-1271.md

23 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271)
![](https://img.shields.io/static/v1?label=Product&message=gzip%2C%20xz-utils&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-179%20-%20Incorrect%20Behavior%20Order%3A%20Early%20Validation%2C%20CWE-1173%20Improper%20Use%20of%20Validation%20Framework&color=brighgreen)
### Description
An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/advxrsary/vuln-scanner
- https://github.com/carbonetes/jacked-action
- https://github.com/carbonetes/jacked-jenkins
- https://github.com/gatecheckdev/gatecheck
- https://github.com/papicella/snyk-K8s-container-iac