Sha256: cd818384239c9d5b2ea2bf8fb0411181d3774b8f521147140eeb765c7c43c459

Contents?: true

Size: 489 Bytes

Versions: 2

Compression:

Stored size: 489 Bytes

Contents

---
gem: rubyzip
cve: 2017-5946
url: https://github.com/rubyzip/rubyzip/issues/315
title: Directory traversal vulnerability in rubyzip
date: 2017-02-27
description: |
  The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory
  traversal vulnerability. If a site allows uploading of .zip files, an attacker
  can upload a malicious file that uses "../" pathname substrings to write arbitrary
  files to the filesystem.
cvss_v3: 6.1
patched_versions:
  - ">= 1.2.1"

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
bundler-audit-0.6.1 data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml