Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 04 Nov 2022 12:06:48 +0100
From: Stefan Bodewig <bodewig@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-37865: Apache Ivy allow create/overwrite any file on the system

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Severity: medium

Description:

With Apache Ivy 2.4.0 an optional packaging attribute has been
introduced that allows artifacts to be unpacked on the fly if they used
pack200 or zip packaging.

For artifacts using the "zip", "jar" or "war" packaging Ivy prior to
2.5.1 doesn't verify the target path when extracting the archive. An
archive containing absolute paths or paths that try to traverse
"upwards" using ".." sequences can then write files to any location on
the local fie system that the user executing Ivy has write access to.

Mitigation:

Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1.

Credit:

This issue was discovered by Kostya Kortchinsky of the Databricks Security Team.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAmNk8kgACgkQohFa4V9ri3IqkQCfQujcSRYhjtUmvl7GuyYn46cc
f9MAn2ZSD7dzeAn9kPK+QqYH6gbH4F0e
=jVS7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.