File tree Expand file tree Collapse file tree 6 files changed +18
-22
lines changed
csharp/ql/src/Security Features/CWE-022
go/ql/src/Security/CWE-022
javascript/ql/src/Security/CWE-022
java/ql/src/Security/CWE/CWE-022
python/ql/src/experimental/Security/CWE-022
ruby/ql/src/experimental/cwe-022-zipslip Expand file tree Collapse file tree 6 files changed +18
-22
lines changed Original file line number Diff line number Diff line change 33 "qhelp.dtd">
44<qhelp >
55<overview >
6- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7- destination file path is within the destination directory can allow an attacker to access
8- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
9- archive paths.</p >
6+ <p >Extracting files from a malicious zip file, or similar type of archive,
7+ is at risk of directory traversal attacks if filenames from the archive are
8+ not properly validated.</p >
109
1110<p >Zip archives contain archive entries representing each file in the archive. These entries
1211include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 55
66<overview >
77<p >
8- Accessing filesystem paths built from the name of an archive entry without validating that the
9- destination file path is within the destination directory can allow an attacker to access
10- unexpected resources, due to the possible presence of directory traversal elements (< code >..</ code >) in
8+ Extracting files from a malicious zip file, or similar type of archive,
9+ is at risk of directory traversal attacks if filenames from the archive are
10+ not properly validated.
1111archive paths.
1212</p >
1313
Original file line number Diff line number Diff line change 33 "qhelp.dtd">
44<qhelp >
55<overview >
6- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7- destination file path is within the destination directory can allow an attacker to access
8- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
9- archive paths.</p >
6+ <p >Extracting files from a malicious zip file, or similar type of archive,
7+ is at risk of directory traversal attacks if filenames from the archive are
8+ not properly validated.</p >
109
1110<p >Zip archives contain archive entries representing each file in the archive. These entries
1211include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 44<qhelp >
55
66<overview >
7- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8- destination file path is within the destination directory can allow an attacker to access
9- unexpected resources, due to the possible presence of directory traversal elements (< code >..</ code >) in
7+ <p >Extracting files from a malicious zip file, or similar type of archive,
8+ is at risk of directory traversal attacks if filenames from the archive are
9+ not properly validated.
1010archive paths.</p >
1111
1212<p >Zip archives contain archive entries representing each file in the archive. These entries
Original file line number Diff line number Diff line change 44<qhelp >
55
66<overview >
7- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8- destination file path is within the destination directory can allow an attacker to access
9- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
10- archive paths.</p >
7+ <p >Extracting files from a malicious zip file, or similar type of archive,
8+ is at risk of directory traversal attacks if filenames from the archive are
9+ not properly validated.</p >
1110
1211<p >Zip archives contain archive entries representing each file in the archive. These entries
1312include a file path for the entry, but these file paths are not restricted and may contain
Original file line number Diff line number Diff line change 44<qhelp >
55
66<overview >
7- <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8- destination file path is within the destination directory can allow an attacker to access
9- unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
10- archive paths.</p >
7+ <p >Extracting files from a malicious zip file, or similar type of archive,
8+ is at risk of directory traversal attacks if filenames from the archive are
9+ not properly validated.</p >
1110
1211<p >Tar archives contain archive entries representing each file in the archive. These entries
1312include a file path for the entry, but these file paths are not restricted and may contain
You can’t perform that action at this time.
0 commit comments