Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.
An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2023:16-01 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Nozomi
Published: 2024-05-15T16:08:41.610Z
Updated: 2024-08-02T08:14:25.135Z
Reserved: 2023-11-02T15:59:53.213Z
Link: CVE-2023-5938

Updated: 2024-08-02T08:14:25.135Z

Status : Awaiting Analysis
Published: 2024-05-15T17:15:09.733
Modified: 2024-11-21T08:42:49.100
Link: CVE-2023-5938

No data.