{ "CVE_data_meta" : { "ASSIGNER" : "cve-assign@distributedweaknessfiling.org", "DATE_ASSIGNED" : "2018-05-17T10:52Z", "ID" : "CVE-2018-1002208", "REQUESTER" : "danny@snyk.io", "STATE" : "PUBLIC", "UPDATED" : "2018-06-11T10:52Z" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "sharplibzip", "version" : { "version_data" : [ { "version_affected" : ">", "version_value" : "0" } ] } } ] }, "vendor_name" : "sharplibzip" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "sharplibzip before 1.0 RC1 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-22" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://github.com/snyk/zip-slip-vulnerability", "refsource" : "MISC", "url" : "https://github.com/snyk/zip-slip-vulnerability" }, { "name" : "https://snyk.io/research/zip-slip-vulnerability", "refsource" : "MISC", "url" : "https://snyk.io/research/zip-slip-vulnerability" }, { "name" : "https://snyk.io/vuln/SNYK-DOTNET-SHARPZIPLIB-60247", "refsource" : "MISC", "url" : "https://snyk.io/vuln/SNYK-DOTNET-SHARPZIPLIB-60247" }, { "name" : "https://github.com/icsharpcode/SharpZipLib/issues/232", "refsource" : "CONFIRM", "url" : "https://github.com/icsharpcode/SharpZipLib/issues/232" }, { "name" : "https://github.com/icsharpcode/SharpZipLib/wiki/Release-1.0", "refsource" : "CONFIRM", "url" : "https://github.com/icsharpcode/SharpZipLib/wiki/Release-1.0" } ] } }