Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks. An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published: 2024-05-15T16:08:41.610Z

Updated: 2024-08-02T08:14:25.135Z

Reserved: 2023-11-02T15:59:53.213Z

Link: CVE-2023-5938

cve-icon Vulnrichment

Updated: 2024-08-02T08:14:25.135Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-15T17:15:09.733

Modified: 2024-11-21T08:42:49.100

Link: CVE-2023-5938

cve-icon Redhat

No data.