File tree Expand file tree Collapse file tree 12 files changed +54
-55
lines changed
csharp/ql/src/Security Features/CWE-022
go/ql/src/Security/CWE-022
javascript/ql/src/Security/CWE-022
java/ql/src/Security/CWE/CWE-022
python/ql/src/experimental/Security/CWE-022
ruby/ql/src/experimental/cwe-022-zipslip Expand file tree Collapse file tree 12 files changed +54
-55
lines changed Original file line number Diff line number Diff line change 3
3
"qhelp.dtd">
4
4
<qhelp >
5
5
<overview >
6
- <p >Extracting files from a malicious zip archive without validating that the destination file path
7
- is within the destination directory can cause files outside the destination directory to be
8
- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
6
+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7
+ destination file path is within the destination directory can allow an attacker to access
8
+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
9
9
archive paths.</p >
10
10
11
11
<p >Zip archives contain archive entries representing each file in the archive. These entries
12
12
include a file path for the entry, but these file paths are not restricted and may contain
13
13
unexpected special elements such as the directory traversal element (<code >..</code >). If these
14
- file paths are used to determine an output file to write the contents of the archive item to, then
15
- the file may be written to an unexpected location. This can result in sensitive information being
14
+ file paths are used to create a filesystem path, then a file operation may happen in an
15
+ unexpected location. This can result in sensitive information being
16
16
revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
17
17
files.</p >
18
18
Original file line number Diff line number Diff line change 1
1
/**
2
- * @name Arbitrary file write during zip extraction ("Zip Slip")
3
- * @description Extracting files from a malicious zip archive without validating that the
4
- * destination file path is within the destination directory can cause files outside
5
- * the destination directory to be overwritten .
2
+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3
+ * @description Accessing filesystem paths built from the name of an archive entry without
4
+ * validating that the destination file path is within the destination directory
5
+ * can allow an attacker to access unexpected resources .
6
6
* @kind path-problem
7
7
* @id cs/zipslip
8
8
* @problem.severity error
Original file line number Diff line number Diff line change 5
5
6
6
<overview >
7
7
<p >
8
- Extracting files from a malicious zip archive without validating that the destination file path
9
- is within the destination directory can cause files outside the destination directory to be
10
- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
8
+ Accessing filesystem paths built from the name of an archive entry without validating that the
9
+ destination file path is within the destination directory can allow an attacker to access
10
+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
11
11
archive paths.
12
12
</p >
13
13
14
14
<p >
15
15
Zip archives contain archive entries representing each file in the archive. These entries
16
16
include a file path for the entry, but these file paths are not restricted and may contain
17
17
unexpected special elements such as the directory traversal element (<code >..</code >). If these
18
- file paths are used to determine which output file the contents of an archive item should be written to, then
19
- the file may be written to an unexpected location. This can result in sensitive information being
18
+ file paths are used to create a filesystem path, then a file operation may happen in an
19
+ unexpected location. This can result in sensitive information being
20
20
revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
21
21
files.
22
22
</p >
Original file line number Diff line number Diff line change 1
1
/**
2
- * @name Arbitrary file write during zip extraction ("zip slip ")
3
- * @description Extracting files from a malicious zip archive without validating that the
4
- * destination file path is within the destination directory can cause files outside
5
- * the destination directory to be overwritten .
2
+ * @name Arbitrary file access during archive extraction ("Zip Slip ")
3
+ * @description Accessing filesystem paths built from the name of an archive entry without
4
+ * validating that the destination file path is within the destination directory
5
+ * can allow an attacker to access unexpected resources .
6
6
* @kind path-problem
7
7
* @id go/zipslip
8
8
* @problem.severity error
Original file line number Diff line number Diff line change 3
3
"qhelp.dtd">
4
4
<qhelp >
5
5
<overview >
6
- <p >Extracting files from a malicious zip archive (or another archive format)
7
- without validating that the destination file path
8
- is within the destination directory can cause files outside the destination directory to be
9
- overwritten, due to the possible presence of directory traversal elements (<code >..</code >) in
6
+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7
+ destination file path is within the destination directory can allow an attacker to access
8
+ unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
10
9
archive paths.</p >
11
10
12
11
<p >Zip archives contain archive entries representing each file in the archive. These entries
13
12
include a file path for the entry, but these file paths are not restricted and may contain
14
13
unexpected special elements such as the directory traversal element (<code >..</code >). If these
15
- file paths are used to determine an output file to write the contents of the archive item to, then
16
- the file may be written to an unexpected location. This can result in sensitive information being
14
+ file paths are used to create a filesystem path, then a file operation may happen in an
15
+ unexpected location. This can result in sensitive information being
17
16
revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
18
17
files.</p >
19
18
Original file line number Diff line number Diff line change 1
1
/**
2
- * @name Arbitrary file write during archive extraction ("Zip Slip")
3
- * @description Extracting files from a malicious archive without validating that the
4
- * destination file path is within the destination directory can cause files outside
5
- * the destination directory to be overwritten .
2
+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3
+ * @description Accessing filesystem paths built from the name of an archive entry without
4
+ * validating that the destination file path is within the destination directory
5
+ * can allow an attacker to access unexpected resources .
6
6
* @kind path-problem
7
7
* @id java/zipslip
8
8
* @problem.severity error
Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
6
6
<overview >
7
- <p >Extracting files from a malicious zip archive without validating that the destination file path
8
- is within the destination directory can cause files outside the destination directory to be
9
- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
7
+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8
+ destination file path is within the destination directory can allow an attacker to access
9
+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
10
10
archive paths.</p >
11
11
12
12
<p >Zip archives contain archive entries representing each file in the archive. These entries
13
13
include a file path for the entry, but these file paths are not restricted and may contain
14
14
unexpected special elements such as the directory traversal element (<code >..</code >). If these
15
- file paths are used to determine an output file to write the contents of the archive item to, then
16
- the file may be written to an unexpected location. This can result in sensitive information being
15
+ file paths are used to create a filesystem path, then a file operation may happen in an
16
+ unexpected location. This can result in sensitive information being
17
17
revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
18
18
files.</p >
19
19
Original file line number Diff line number Diff line change 1
1
/**
2
- * @name Arbitrary file write during zip extraction ("Zip Slip")
3
- * @description Extracting files from a malicious zip archive without validating that the
4
- * destination file path is within the destination directory can cause files outside
5
- * the destination directory to be overwritten .
2
+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3
+ * @description Accessing filesystem paths built from the name of an archive entry without
4
+ * validating that the destination file path is within the destination directory
5
+ * can allow an attacker to access unexpected resources .
6
6
* @kind path-problem
7
7
* @id js/zipslip
8
8
* @problem.severity error
Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
6
6
<overview >
7
- <p >Extracting files from a malicious zip archive without validating that the destination file path
8
- is within the destination directory can cause files outside the destination directory to be
9
- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
7
+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8
+ destination file path is within the destination directory can allow an attacker to access
9
+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
10
10
archive paths.</p >
11
11
12
12
<p >Zip archives contain archive entries representing each file in the archive. These entries
13
13
include a file path for the entry, but these file paths are not restricted and may contain
14
14
unexpected special elements such as the directory traversal element (<code >..</code >). If these
15
- file paths are used to determine an output file to write the contents of the archive item to, then
16
- the file may be written to an unexpected location. This can result in sensitive information being
15
+ file paths are used to create a filesystem path, then a file operation may happen in an
16
+ unexpected location. This can result in sensitive information being
17
17
revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
18
18
files.</p >
19
19
Original file line number Diff line number Diff line change 1
1
/**
2
- * @name Arbitrary file write during archive extraction ("Zip Slip")
3
- * @description Extracting files from a malicious archive without validating that the
4
- * destination file path is within the destination directory can cause files outside
5
- * the destination directory to be overwritten .
2
+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3
+ * @description Accessing filesystem paths built from the name of an archive entry without
4
+ * validating that the destination file path is within the destination directory
5
+ * can allow an attacker to access unexpected resources .
6
6
* @kind path-problem
7
7
* @id py/zipslip
8
8
* @problem.severity error
You can’t perform that action at this time.
0 commit comments