Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1002200 (GCVE-0-2018-1002200)
Vulnerability from cvelistv5 – Published: 2018-07-25 17:00 – Updated: 2024-08-05 12:47
VLAI?
EPSS
Summary
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Severity ?
No CVSS data available.
CWE
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Codehaus | plexus-archiver |
Affected:
unspecified , < 3.6.0
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:47:57.447Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"name": "DSA-4227",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"name": "RHSA-2018:1837",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"name": "RHSA-2018:1836",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "plexus-archiver",
"vendor": "Codehaus",
"versions": [
{
"lessThan": "3.6.0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"dateAssigned": "2018-05-17T00:00:00",
"datePublic": "2018-05-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-26T09:57:01",
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"name": "DSA-4227",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"name": "RHSA-2018:1837",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"name": "RHSA-2018:1836",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_ASSIGNED": "2018-05-17T10:52Z",
"ID": "CVE-2018-1002200",
"REQUESTER": "danny@snyk.io",
"STATE": "PUBLIC",
"UPDATED": "2018-05-17T10:52Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "plexus-archiver",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "3.6.0"
}
]
}
}
]
},
"vendor_name": "Codehaus"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/research/zip-slip-vulnerability",
"refsource": "MISC",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8",
"refsource": "CONFIRM",
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"name": "DSA-4227",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"name": "https://github.com/snyk/zip-slip-vulnerability",
"refsource": "MISC",
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"name": "RHSA-2018:1837",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/pull/87",
"refsource": "CONFIRM",
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"name": "RHSA-2018:1836",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"assignerShortName": "snyk",
"cveId": "CVE-2018-1002200",
"datePublished": "2018-07-25T17:00:00",
"dateReserved": "2018-07-25T00:00:00",
"dateUpdated": "2024-08-05T12:47:57.447Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.6.0\", \"matchCriteriaId\": \"A47743E6-5F1B-4C00-BF3B-3C4DE2EDDB5B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EB48767-F095-444F-9E05-D9AC345AB803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.\"}, {\"lang\": \"es\", \"value\": \"plexus-archiver en versiones anteriores a la 3.6.0 es vulnerable a un salto de directorio, lo que permite que los atacantes escriban en archivos arbitrarios mediante un ../ (punto punto barra) en una entrada de archivo que se gestiona de manera incorrecta durante la extracci\\u00f3n. Esta vulnerabilidad tambi\\u00e9n se conoce como \\\"Zip-Slip\\\".\"}]",
"id": "CVE-2018-1002200",
"lastModified": "2024-11-21T03:40:39.293",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2018-07-25T17:29:00.237",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2018:1836\", \"source\": \"report@snyk.io\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1837\", \"source\": \"report@snyk.io\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8\", \"source\": \"report@snyk.io\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/codehaus-plexus/plexus-archiver/pull/87\", \"source\": \"report@snyk.io\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/snyk/zip-slip-vulnerability\", \"source\": \"report@snyk.io\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://snyk.io/research/zip-slip-vulnerability\", \"source\": \"report@snyk.io\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680\", \"source\": \"report@snyk.io\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4227\", \"source\": \"report@snyk.io\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1836\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1837\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/codehaus-plexus/plexus-archiver/pull/87\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/snyk/zip-slip-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://snyk.io/research/zip-slip-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4227\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "report@snyk.io",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"report@snyk.io\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-1002200\",\"sourceIdentifier\":\"report@snyk.io\",\"published\":\"2018-07-25T17:29:00.237\",\"lastModified\":\"2024-11-21T03:40:39.293\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.\"},{\"lang\":\"es\",\"value\":\"plexus-archiver en versiones anteriores a la 3.6.0 es vulnerable a un salto de directorio, lo que permite que los atacantes escriban en archivos arbitrarios mediante un ../ (punto punto barra) en una entrada de archivo que se gestiona de manera incorrecta durante la extracci\u00f3n. Esta vulnerabilidad tambi\u00e9n se conoce como \\\"Zip-Slip\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"report@snyk.io\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.6.0\",\"matchCriteriaId\":\"A47743E6-5F1B-4C00-BF3B-3C4DE2EDDB5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB48767-F095-444F-9E05-D9AC345AB803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1836\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1837\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8\",\"source\":\"report@snyk.io\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/codehaus-plexus/plexus-archiver/pull/87\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/snyk/zip-slip-vulnerability\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/research/zip-slip-vulnerability\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680\",\"source\":\"report@snyk.io\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4227\",\"source\":\"report@snyk.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/codehaus-plexus/plexus-archiver/pull/87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/snyk/zip-slip-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/research/zip-slip-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2018_1837
Vulnerability from csaf_redhat - Published: 2018-06-12 15:08 - Updated: 2024-11-14 23:43Summary
Red Hat Security Advisory: rh-maven33-plexus-archiver and rh-maven35-plexus-archiver security update
Notes
Topic
An update for rh-maven33-plexus-archiver and rh-maven35-plexus-archiver is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-maven33-plexus-archiver and rh-maven35-plexus-archiver is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.\n\nSecurity Fix(es):\n\n* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Danny Grander (Snyk) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1837",
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"category": "external",
"summary": "1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1837.json"
}
],
"title": "Red Hat Security Advisory: rh-maven33-plexus-archiver and rh-maven35-plexus-archiver security update",
"tracking": {
"current_release_date": "2024-11-14T23:43:38+00:00",
"generator": {
"date": "2024-11-14T23:43:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1837",
"initial_release_date": "2018-06-12T15:08:47+00:00",
"revision_history": [
{
"date": "2018-06-12T15:08:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-12T15:08:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:43:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product_id": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver@3.4-4.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product_id": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver-javadoc@2.4.2-5.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product_id": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver-javadoc@2.4.2-5.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product_id": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver-javadoc@3.4-4.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product_id": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver@3.4-4.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Danny Grander"
],
"organization": "Snyk"
}
],
"cve": "CVE-2018-1002200",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1584392"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1002200"
},
{
"category": "external",
"summary": "RHBZ#1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1002200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"release_date": "2018-06-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-12T15:08:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file"
}
]
}
RHSA-2018_1836
Vulnerability from csaf_redhat - Published: 2018-06-12 14:49 - Updated: 2024-11-14 23:43Summary
Red Hat Security Advisory: plexus-archiver security update
Notes
Topic
An update for plexus-archiver is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for plexus-archiver is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.\n\nSecurity Fix(es):\n\n* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Danny Grander (Snyk) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1836",
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"category": "external",
"summary": "1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1836.json"
}
],
"title": "Red Hat Security Advisory: plexus-archiver security update",
"tracking": {
"current_release_date": "2024-11-14T23:43:28+00:00",
"generator": {
"date": "2024-11-14T23:43:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1836",
"initial_release_date": "2018-06-12T14:49:02+00:00",
"revision_history": [
{
"date": "2018-06-12T14:49:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-12T14:49:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T23:43:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product_id": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver@2.4.2-5.el7_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product_id": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver@2.4.2-5.el7_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product_id": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver-javadoc@2.4.2-5.el7_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Danny Grander"
],
"organization": "Snyk"
}
],
"cve": "CVE-2018-1002200",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1584392"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1002200"
},
{
"category": "external",
"summary": "RHBZ#1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1002200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"release_date": "2018-06-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-12T14:49:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file"
}
]
}
RHSA-2018:1837
Vulnerability from csaf_redhat - Published: 2018-06-12 15:08 - Updated: 2025-11-21 18:05Summary
Red Hat Security Advisory: rh-maven33-plexus-archiver and rh-maven35-plexus-archiver security update
Notes
Topic
An update for rh-maven33-plexus-archiver and rh-maven35-plexus-archiver is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-maven33-plexus-archiver and rh-maven35-plexus-archiver is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.\n\nSecurity Fix(es):\n\n* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Danny Grander (Snyk) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1837",
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"category": "external",
"summary": "1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1837.json"
}
],
"title": "Red Hat Security Advisory: rh-maven33-plexus-archiver and rh-maven35-plexus-archiver security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:10+00:00",
"generator": {
"date": "2025-11-21T18:05:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1837",
"initial_release_date": "2018-06-12T15:08:47+00:00",
"revision_history": [
{
"date": "2018-06-12T15:08:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-12T15:08:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product_id": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver@3.4-4.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product_id": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver-javadoc@2.4.2-5.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product_id": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver@2.4.2-5.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product_id": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven33-plexus-archiver-javadoc@2.4.2-5.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product_id": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver-javadoc@3.4-4.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product_id": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-maven35-plexus-archiver@3.4-4.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src"
},
"product_reference": "rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch"
},
"product_reference": "rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src"
},
"product_reference": "rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
},
"product_reference": "rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-3.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Danny Grander"
],
"organization": "Snyk"
}
],
"cve": "CVE-2018-1002200",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1584392"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1002200"
},
{
"category": "external",
"summary": "RHBZ#1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1002200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"release_date": "2018-06-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-12T15:08:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1-6.7.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.noarch",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el6.src",
"6Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el6.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-Alt-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.3.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.4.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1-7.5.Z:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Server-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Server-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-0:2.4.2-5.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven33-plexus-archiver-javadoc-0:2.4.2-5.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.noarch",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-0:3.4-4.1.el7.src",
"7Workstation-RHSCL-3.1:rh-maven35-plexus-archiver-javadoc-0:3.4-4.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file"
}
]
}
RHSA-2018:1836
Vulnerability from csaf_redhat - Published: 2018-06-12 14:49 - Updated: 2025-11-21 18:05Summary
Red Hat Security Advisory: plexus-archiver security update
Notes
Topic
An update for plexus-archiver is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for plexus-archiver is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.\n\nSecurity Fix(es):\n\n* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Danny Grander (Snyk) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1836",
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"category": "external",
"summary": "1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1836.json"
}
],
"title": "Red Hat Security Advisory: plexus-archiver security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:10+00:00",
"generator": {
"date": "2025-11-21T18:05:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1836",
"initial_release_date": "2018-06-12T14:49:02+00:00",
"revision_history": [
{
"date": "2018-06-12T14:49:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-12T14:49:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product_id": "plexus-archiver-0:2.4.2-5.el7_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver@2.4.2-5.el7_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product_id": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver@2.4.2-5.el7_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product_id": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/plexus-archiver-javadoc@2.4.2-5.el7_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-0:2.4.2-5.el7_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src"
},
"product_reference": "plexus-archiver-0:2.4.2-5.el7_5.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
},
"product_reference": "plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Danny Grander"
],
"organization": "Snyk"
}
],
"cve": "CVE-2018-1002200",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1584392"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1002200"
},
{
"category": "external",
"summary": "RHBZ#1584392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584392"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1002200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"category": "external",
"summary": "https://snyk.io/research/zip-slip-vulnerability",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"release_date": "2018-06-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-12T14:49:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Client-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Client-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7ComputeNode-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Server-optional-Alt-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.noarch",
"7Workstation-optional-7.5.Z:plexus-archiver-0:2.4.2-5.el7_5.src",
"7Workstation-optional-7.5.Z:plexus-archiver-javadoc-0:2.4.2-5.el7_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file"
}
]
}
FKIE_CVE-2018-1002200
Vulnerability from fkie_nvd - Published: 2018-07-25 17:29 - Updated: 2024-11-21 03:40
Severity ?
Summary
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| codehaus-plexus | plexus-archiver | * | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| redhat | enterprise_linux | 7.5 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_workstation | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A47743E6-5F1B-4C00-BF3B-3C4DE2EDDB5B",
"versionEndExcluding": "3.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB48767-F095-444F-9E05-D9AC345AB803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027."
},
{
"lang": "es",
"value": "plexus-archiver en versiones anteriores a la 3.6.0 es vulnerable a un salto de directorio, lo que permite que los atacantes escriban en archivos arbitrarios mediante un ../ (punto punto barra) en una entrada de archivo que se gestiona de manera incorrecta durante la extracci\u00f3n. Esta vulnerabilidad tambi\u00e9n se conoce como \"Zip-Slip\"."
}
],
"id": "CVE-2018-1002200",
"lastModified": "2024-11-21T03:40:39.293",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-25T17:29:00.237",
"references": [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4227"
}
],
"sourceIdentifier": "report@snyk.io",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "report@snyk.io",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2018-1002200
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2018-1002200",
"description": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.",
"id": "GSD-2018-1002200",
"references": [
"https://www.debian.org/security/2018/dsa-4227",
"https://access.redhat.com/errata/RHSA-2018:1837",
"https://access.redhat.com/errata/RHSA-2018:1836",
"https://advisories.mageia.org/CVE-2018-1002200.html",
"https://linux.oracle.com/cve/CVE-2018-1002200.html",
"https://ubuntu.com/security/CVE-2018-1002200"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-1002200"
],
"details": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.",
"id": "GSD-2018-1002200",
"modified": "2023-12-13T01:22:37.785132Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"DATE_ASSIGNED": "2018-05-17T10:52Z",
"ID": "CVE-2018-1002200",
"REQUESTER": "danny@snyk.io",
"STATE": "PUBLIC",
"UPDATED": "2018-05-17T10:52Z"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "plexus-archiver",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "3.6.0"
}
]
}
}
]
},
"vendor_name": "Codehaus"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/research/zip-slip-vulnerability",
"refsource": "MISC",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8",
"refsource": "CONFIRM",
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"name": "DSA-4227",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"name": "https://github.com/snyk/zip-slip-vulnerability",
"refsource": "MISC",
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"name": "RHSA-2018:1837",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/pull/87",
"refsource": "CONFIRM",
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"name": "RHSA-2018:1836",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,3.6.0)",
"affected_versions": "All versions before 3.6.0",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"cvss_v3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-22",
"CWE-937"
],
"date": "2022-06-30",
"description": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.",
"fixed_versions": [
"3.6.0"
],
"identifier": "CVE-2018-1002200",
"identifiers": [
"GHSA-hcxq-x77q-3469",
"CVE-2018-1002200"
],
"not_impacted": "All versions starting from 3.6.0",
"package_slug": "maven/org.codehaus.plexus/plexus-archiver",
"pubdate": "2022-05-13",
"solution": "Upgrade to version 3.6.0 or above.",
"title": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"https://github.com/codehaus-plexus/plexus-archiver/pull/87",
"https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8",
"https://access.redhat.com/errata/RHSA-2018:1836",
"https://access.redhat.com/errata/RHSA-2018:1837",
"https://github.com/snyk/zip-slip-vulnerability",
"https://snyk.io/research/zip-slip-vulnerability",
"https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680",
"https://www.debian.org/security/2018/dsa-4227",
"https://github.com/advisories/GHSA-hcxq-x77q-3469"
],
"uuid": "b709c2f4-0324-4c48-8134-d2fa3d37fefe"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "report@snyk.io",
"ID": "CVE-2018-1002200"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"name": "https://snyk.io/research/zip-slip-vulnerability",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"name": "https://github.com/snyk/zip-slip-vulnerability",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/pull/87",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"name": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"name": "DSA-4227",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4227"
},
{
"name": "RHSA-2018:1837",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"name": "RHSA-2018:1836",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-08-02T16:17Z",
"publishedDate": "2018-07-25T17:29Z"
}
}
}
CNVD-2018-14232
Vulnerability from cnvd - Published: 2018-07-30
VLAI Severity ?
Title
plexus-archiver目录遍历漏洞
Description
plexus-archiver是一个用于压缩/解压缩的库。
plexus-archiver 3.6.0之前版本中存在目录遍历漏洞。攻击者可借助带有目录遍历名称的特制的zip归档文件利用该漏洞写入文件。
Severity
中
Patch Name
plexus-archiver目录遍历漏洞的补丁
Patch Description
plexus-archiver是一个用于压缩/解压缩的库。
plexus-archiver 3.6.0之前版本中存在目录遍历漏洞。攻击者可借助带有目录遍历名称的特制的zip归档文件利用该漏洞写入文件。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-1002200
Impacted products
| Name | plexus-archiver plexus-archiver <3.6.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-1002200"
}
},
"description": "plexus-archiver\u662f\u4e00\u4e2a\u7528\u4e8e\u538b\u7f29/\u89e3\u538b\u7f29\u7684\u5e93\u3002\r\n\r\nplexus-archiver 3.6.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5e26\u6709\u76ee\u5f55\u904d\u5386\u540d\u79f0\u7684\u7279\u5236\u7684zip\u5f52\u6863\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u5199\u5165\u6587\u4ef6\u3002",
"discovererName": "Unknow",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-14232",
"openTime": "2018-07-30",
"patchDescription": "plexus-archiver\u662f\u4e00\u4e2a\u7528\u4e8e\u538b\u7f29/\u89e3\u538b\u7f29\u7684\u5e93\u3002\r\n\r\nplexus-archiver 3.6.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u5e26\u6709\u76ee\u5f55\u904d\u5386\u540d\u79f0\u7684\u7279\u5236\u7684zip\u5f52\u6863\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u5199\u5165\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "plexus-archiver\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "plexus-archiver plexus-archiver \u003c3.6.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200",
"serverity": "\u4e2d",
"submitTime": "2018-07-26",
"title": "plexus-archiver\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e"
}
GHSA-HCXQ-X77Q-3469
Vulnerability from github – Published: 2022-05-13 01:35 – Updated: 2022-06-30 15:19
VLAI?
Summary
Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver
Details
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Severity ?
5.5 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.codehaus.plexus:plexus-archiver"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.6.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2018-1002200"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": true,
"github_reviewed_at": "2022-06-30T15:19:51Z",
"nvd_published_at": "2018-07-25T17:29:00Z",
"severity": "MODERATE"
},
"details": "plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as \u0027Zip-Slip\u0027.",
"id": "GHSA-hcxq-x77q-3469",
"modified": "2022-06-30T15:19:51Z",
"published": "2022-05-13T01:35:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1002200"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/pull/87"
},
{
"type": "WEB",
"url": "https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1836"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1837"
},
{
"type": "PACKAGE",
"url": "https://github.com/codehaus-plexus/plexus-archiver"
},
{
"type": "WEB",
"url": "https://github.com/snyk/zip-slip-vulnerability"
},
{
"type": "WEB",
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4227"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "Improper Limitation of a Pathname to a Restricted Directory in plexus-archiver"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…