René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.6 KiB
JSON

{
"id": "CVE-2021-23521",
"sourceIdentifier": "report@snyk.io",
"published": "2022-01-31T11:15:07.933",
"lastModified": "2022-02-07T18:32:12.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "This affects the package juce-framework/JUCE before 6.1.5. This vulnerability is triggered when a malicious archive is crafted with an entry containing a symbolic link. When extracted, the symbolic link is followed outside of the target dir allowing writing arbitrary files on the target host. In some cases, this can allow an attacker to execute arbitrary code. The vulnerable code is in the ZipFile::uncompressEntry function in juce_ZipFile.cpp and is executed when the archive is extracted upon calling uncompressTo() on a ZipFile object."
},
{
"lang": "es",
"value": "Esto afecta al paquete juce-framework/JUCE versiones anteriores a 6.1.5. Esta vulnerabilidad es desencadenada cuando es dise\u00f1ado un archivo malicioso con una entrada que contiene un enlace simb\u00f3lico. Cuando es extra\u00eddo, el enlace simb\u00f3lico es seguido fuera del dir de destino permitiendo una escritura de archivos arbitrarios en el host de destino. En algunos casos, esto puede permitir a un atacante ejecutar c\u00f3digo arbitrario. El c\u00f3digo vulnerable es encontrado en la funci\u00f3n ZipFile::uncompressEntry en el archivo juce_ZipFile.cpp y es ejecutado cuando es extra\u00eddo el archivo al llamar a uncompressTo() en un objeto ZipFile"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:juce:juce:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.5",
"matchCriteriaId": "4F84CF05-0ECE-487B-8D76-61D92E46A891"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f",
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388608",
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}