Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks.
An administrator able to provide tampered archives to be processed by the affected versions of Arc may be able to have arbitrary files extracted to arbitrary filesystem locations. Leveraging this issue, an attacker may be able to overwrite arbitrary files on the target filesystem and cause critical impacts on the system (e.g., arbitrary command execution on the victim’s machine).
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2023:16-01 |
|
History
No history.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-08-02T08:14:25.135Z
Reserved: 2023-11-02T15:59:53.213Z
Link: CVE-2023-5938
Updated: 2024-08-02T08:14:25.135Z
Status : Deferred
Published: 2024-05-15T17:15:09.733
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-5938
No data.
OpenCVE Enrichment
No data.