2024-12-08 03:06:42 +00:00

113 lines
3.7 KiB
JSON

{
"id": "CVE-2021-22114",
"sourceIdentifier": "security@vmware.com",
"published": "2021-03-01T18:15:19.690",
"lastModified": "2024-11-21T05:49:32.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder."
},
{
"lang": "es",
"value": "Aborda la correcci\u00f3n parcial en el CVE-2018-1263. Spring-integration-zip, versiones anteriores a 1.0.4, expone una vulnerabilidad de escritura de archivo arbitraria, que puede ser lograda usando un archivo zip especialmente dise\u00f1ado (tambi\u00e9n afecta a otros archivos, bzip2, tar, xz, war, cpio, 7z), que contiene nombres de archivo de salto de ruta. Entonces, cuando el nombre de archivo se concatena al directorio de extracci\u00f3n de destino, la ruta final termina fuera de la carpeta de destino"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:spring_integration_zip:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "D402FDCB-C91F-4BDE-88F7-062F0F1CEF08"
}
]
}
]
}
],
"references": [
{
"url": "https://tanzu.vmware.com/security/cve-2021-22114",
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://tanzu.vmware.com/security/cve-2021-22114",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}