Directory Traversal Affecting servicemesh-pilot-discovery package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.15% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-SERVICEMESHPILOTDISCOVERY-4394841
  • published26 Mar 2023
  • disclosed12 May 2019

Introduced: 12 May 2019

CVE-2019-10743  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 servicemesh-pilot-discovery.

NVD Description

Note: Versions mentioned in the description apply only to the upstream servicemesh-pilot-discovery package and not the servicemesh-pilot-discovery package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

All versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.

CVSS Scores

version 3.1