Bug 2165797 (CVE-2022-48285) - CVE-2022-48285 jszip: directory traversal via a crafted ZIP archive
Summary: CVE-2022-48285 jszip: directory traversal via a crafted ZIP archive
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-48285
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2166199 2166203 2166204 2166205
Blocks: 2165560
TreeView+ depends on / blocked
 
Reported: 2023-01-31 05:22 UTC by TEJ RATHI
Modified: 2023-09-01 04:43 UTC (History)
31 users (show)

Fixed In Version: jszip 3.8.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the JSZip package. Affected versions of JSZip could allow a remote attacker to traverse directories on the system caused by the failure to sanitize filenames when files are loaded with `loadAsync`, which makes the library vulnerable to a Zip Slip attack. By extracting files from a specially crafted archive, an attacker could gain access to parts of the file system outside of the target folder, overwrite the executable files, and execute arbitrary commands on the system.
Clone Of:
Environment:
Last Closed: 2023-03-23 11:48:38 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:1428 0 None None None 2023-03-23 02:16:28 UTC

Comment 2 Avinash Hanwate 2023-02-01 07:09:25 UTC
Created mozjs68 tracking bugs for this issue:

Affects: fedora-all [bug 2166203]


Created mozjs78 tracking bugs for this issue:

Affects: fedora-all [bug 2166204]


Created seamonkey tracking bugs for this issue:

Affects: fedora-all [bug 2166205]

Comment 6 errata-xmlrpc 2023-03-23 02:16:27 UTC
This issue has been addressed in the following products:

  Red Hat Migration Toolkit for Containers 1.7

Via RHSA-2023:1428 https://access.redhat.com/errata/RHSA-2023:1428

Comment 7 Product Security DevOps Team 2023-03-23 11:48:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-48285


Note You need to log in before you can comment on or make changes to this bug.