File tree Expand file tree Collapse file tree 6 files changed +18
-22
lines changed
csharp/ql/src/Security Features/CWE-022
go/ql/src/Security/CWE-022
javascript/ql/src/Security/CWE-022
java/ql/src/Security/CWE/CWE-022
python/ql/src/experimental/Security/CWE-022
ruby/ql/src/experimental/cwe-022-zipslip Expand file tree Collapse file tree 6 files changed +18
-22
lines changed Original file line number Diff line number Diff line change 3
3
"qhelp.dtd">
4
4
<qhelp >
5
5
<overview >
6
- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7
- destination file path is within the destination directory can allow an attacker to access
8
- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
9
- archive paths.</p >
6
+ <p >Extracting files from a malicious zip file, or similar type of archive,
7
+ is at risk of directory traversal attacks if filenames from the archive are
8
+ not properly validated.</p >
10
9
11
10
<p >Zip archives contain archive entries representing each file in the archive. These entries
12
11
include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 5
5
6
6
<overview >
7
7
<p >
8
- Accessing filesystem paths built from the name of an archive entry without validating that the
9
- destination file path is within the destination directory can allow an attacker to access
10
- unexpected resources, due to the possible presence of directory traversal elements (< code >..</ code >) in
8
+ Extracting files from a malicious zip file, or similar type of archive,
9
+ is at risk of directory traversal attacks if filenames from the archive are
10
+ not properly validated.
11
11
archive paths.
12
12
</p >
13
13
Original file line number Diff line number Diff line change 3
3
"qhelp.dtd">
4
4
<qhelp >
5
5
<overview >
6
- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7
- destination file path is within the destination directory can allow an attacker to access
8
- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
9
- archive paths.</p >
6
+ <p >Extracting files from a malicious zip file, or similar type of archive,
7
+ is at risk of directory traversal attacks if filenames from the archive are
8
+ not properly validated.</p >
10
9
11
10
<p >Zip archives contain archive entries representing each file in the archive. These entries
12
11
include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
6
6
<overview >
7
- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8
- destination file path is within the destination directory can allow an attacker to access
9
- unexpected resources, due to the possible presence of directory traversal elements (< code >..</ code >) in
7
+ <p >Extracting files from a malicious zip file, or similar type of archive,
8
+ is at risk of directory traversal attacks if filenames from the archive are
9
+ not properly validated.
10
10
archive paths.</p >
11
11
12
12
<p >Zip archives contain archive entries representing each file in the archive. These entries
Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
6
6
<overview >
7
- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8
- destination file path is within the destination directory can allow an attacker to access
9
- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
10
- archive paths.</p >
7
+ <p >Extracting files from a malicious zip file, or similar type of archive,
8
+ is at risk of directory traversal attacks if filenames from the archive are
9
+ not properly validated.</p >
11
10
12
11
<p >Zip archives contain archive entries representing each file in the archive. These entries
13
12
include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
6
6
<overview >
7
- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8
- destination file path is within the destination directory can allow an attacker to access
9
- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
10
- archive paths.</p >
7
+ <p >Extracting files from a malicious zip file, or similar type of archive,
8
+ is at risk of directory traversal attacks if filenames from the archive are
9
+ not properly validated.</p >
11
10
12
11
<p >Tar archives contain archive entries representing each file in the archive. These entries
13
12
include a file path for the entry, but these file paths are not restricted and may contain
You can’t perform that action at this time.
0 commit comments