Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 25 Mar 2016 15:55:44 +0600
From: Maxim Solodovnik <>
To: Openmeetings user-list <>, dev <>,,,,
Subject: [CVE-2016-0784] ZIP file path traversal

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected: Apache OpenMeetings 1.9.x - 3.1.0

The Import/Export System Backups functionality in the OpenMeetings
menu (http://domain:5080/openmeetings/#admin/backup) is vulnerable to path
traversal via specially crafted file names within ZIP archives. By uploading an
archive containing a file named ../../../public/hello.txt will write
the file “hello.txt”
to the http://domain:5080/openmeetings/public/ directory. This could
be used to, for example,
overwrite the /usr/bin/convert file (or any other 3 rd party
integrated executable)
with a shell script, which would be executed the next time an image
file is uploaded
and imagemagick is invoked.

All users are recommended to upgrade to Apache OpenMeetings 3.1.1

Credit: This issue was identified by Andreas Lindh

Apache OpenMeetings Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ