-
-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Minitar directory traversal vulnerability #16
Comments
Hi @halostatue, I'm in the process of requesting a CVE for this issue. It looks like this has been resolved. I see that the latest version on Rubygems is 0.5.4. Is this still a pre-release repo? Is it correct to say that it will be fixed in 0.6, whenever that's released? |
It is correct to say that will be fixed in 0.6. I hope to have this released soon but am trying to catch up on other stuff before I release this (which is a slightly breaking change). |
It’s blocked on #20, but that’s all on me. |
This is a proposed patch for previous versions |
This issue has been assigned CVE-2016-10173 |
Note, |
Thank you. I’m in the middle of a fairly busy week at work and do not expect to be able to finalize and prepare a release before the weekend at the earliest. Sorry for this, but this hasn’t been something at the top of my priority list because it’s not my paying job. I will try to get it done for the weekend. |
Fixes #16, CVE-2016-10173 Also makes the move from minitar.gemspec to archive-tar-minitar.gemspec.
Fixes #16, CVE-2016-10173 Also makes the move from minitar.gemspec to archive-tar-minitar.gemspec.
Fixes #16, CVE-2016-10173 Also makes the move from minitar.gemspec to archive-tar-minitar.gemspec.
Fixes #16, CVE-2016-10173 Also makes the move from minitar.gemspec to archive-tar-minitar.gemspec.
Version: 0.5.4 Advisory: CVE-2016-10173 Criticality: Unknown URL: halostatue/minitar#16 Title: Minitar Directory Traversal Vulnerability Solution: upgrade to >= 0.6.1
Overview
Minitar allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename. Analogous vulnerabilities for unzip and tar: https://www.cvedetails.com/cve/CVE-2001-1268/ and http://www.cvedetails.com/cve/CVE-2001-1267/
Proof of Concept
Desired behaviour:
Example how
bsdtar
handles this kind of issues:Vulnerable, verified versions of gems:
Related issue: atoulme/minitar#5
The text was updated successfully, but these errors were encountered: