You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SharpZipLib before 1.0 RC1 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
CVE-2018-1002208 - Medium Severity Vulnerability
Vulnerable Libraries - ICSharpCode.SharpZipLib-0.86.0.518.dll, ICSharpCode.SharpZipLib.dll
ICSharpCode.SharpZipLib-0.86.0.518.dll
SharpZipLib for .NET Framework 2.0
Library home page: https://api.nuget.org/packages/icsharpcode.sharpziplib.0.86.0.518.nupkg
Path to vulnerable library: /References/DNN/09.02.02/ICSharpCode.SharpZipLib.dll
Dependency Hierarchy:
ICSharpCode.SharpZipLib.dll
ICSharpCode.SharpZipLibrary
Library home page: https://api.nuget.org/packages/netsword.common.icsharpcode.sharpziplib.0.84.0.nupkg
Path to vulnerable library: /Build/ICSharpCode.SharpZipLib.dll
Dependency Hierarchy:
Found in HEAD commit: 99eddc879984576ef8d3c958e11d5862bf2924c3
Found in base branch: master
Vulnerability Details
SharpZipLib before 1.0 RC1 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Publish Date: 2018-07-25
URL: CVE-2018-1002208
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002208
Release Date: 2018-07-25
Fix Resolution: SharpZipLib - 1.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: