File tree Expand file tree Collapse file tree 12 files changed +54
-55
lines changed
csharp/ql/src/Security Features/CWE-022
go/ql/src/Security/CWE-022
javascript/ql/src/Security/CWE-022
java/ql/src/Security/CWE/CWE-022
python/ql/src/experimental/Security/CWE-022
ruby/ql/src/experimental/cwe-022-zipslip Expand file tree Collapse file tree 12 files changed +54
-55
lines changed Original file line number Diff line number Diff line change 33 "qhelp.dtd">
44<qhelp >
55<overview >
6- <p >Extracting files from a malicious zip archive without validating that the destination file path
7- is within the destination directory can cause files outside the destination directory to be
8- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
6+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7+ destination file path is within the destination directory can allow an attacker to access
8+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
99archive paths.</p >
1010
1111<p >Zip archives contain archive entries representing each file in the archive. These entries
1212include a file path for the entry, but these file paths are not restricted and may contain
1313unexpected special elements such as the directory traversal element (<code >..</code >). If these
14- file paths are used to determine an output file to write the contents of the archive item to, then
15- the file may be written to an unexpected location. This can result in sensitive information being
14+ file paths are used to create a filesystem path, then a file operation may happen in an
15+ unexpected location. This can result in sensitive information being
1616revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
1717files.</p >
1818
Original file line number Diff line number Diff line change 11/**
2- * @name Arbitrary file write during zip extraction ("Zip Slip")
3- * @description Extracting files from a malicious zip archive without validating that the
4- * destination file path is within the destination directory can cause files outside
5- * the destination directory to be overwritten .
2+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3+ * @description Accessing filesystem paths built from the name of an archive entry without
4+ * validating that the destination file path is within the destination directory
5+ * can allow an attacker to access unexpected resources .
66 * @kind path-problem
77 * @id cs/zipslip
88 * @problem.severity error
Original file line number Diff line number Diff line change 55
66<overview >
77<p >
8- Extracting files from a malicious zip archive without validating that the destination file path
9- is within the destination directory can cause files outside the destination directory to be
10- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
8+ Accessing filesystem paths built from the name of an archive entry without validating that the
9+ destination file path is within the destination directory can allow an attacker to access
10+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
1111archive paths.
1212</p >
1313
1414<p >
1515Zip archives contain archive entries representing each file in the archive. These entries
1616include a file path for the entry, but these file paths are not restricted and may contain
1717unexpected special elements such as the directory traversal element (<code >..</code >). If these
18- file paths are used to determine which output file the contents of an archive item should be written to, then
19- the file may be written to an unexpected location. This can result in sensitive information being
18+ file paths are used to create a filesystem path, then a file operation may happen in an
19+ unexpected location. This can result in sensitive information being
2020revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
2121files.
2222</p >
Original file line number Diff line number Diff line change 11/**
2- * @name Arbitrary file write during zip extraction ("zip slip ")
3- * @description Extracting files from a malicious zip archive without validating that the
4- * destination file path is within the destination directory can cause files outside
5- * the destination directory to be overwritten .
2+ * @name Arbitrary file access during archive extraction ("Zip Slip ")
3+ * @description Accessing filesystem paths built from the name of an archive entry without
4+ * validating that the destination file path is within the destination directory
5+ * can allow an attacker to access unexpected resources .
66 * @kind path-problem
77 * @id go/zipslip
88 * @problem.severity error
Original file line number Diff line number Diff line change 33 "qhelp.dtd">
44<qhelp >
55<overview >
6- <p >Extracting files from a malicious zip archive (or another archive format)
7- without validating that the destination file path
8- is within the destination directory can cause files outside the destination directory to be
9- overwritten, due to the possible presence of directory traversal elements (<code >..</code >) in
6+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
7+ destination file path is within the destination directory can allow an attacker to access
8+ unexpected resources, due to the possible presence of directory traversal elements (<code >..</code >) in
109archive paths.</p >
1110
1211<p >Zip archives contain archive entries representing each file in the archive. These entries
1312include a file path for the entry, but these file paths are not restricted and may contain
1413unexpected special elements such as the directory traversal element (<code >..</code >). If these
15- file paths are used to determine an output file to write the contents of the archive item to, then
16- the file may be written to an unexpected location. This can result in sensitive information being
14+ file paths are used to create a filesystem path, then a file operation may happen in an
15+ unexpected location. This can result in sensitive information being
1716revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
1817files.</p >
1918
Original file line number Diff line number Diff line change 11/**
2- * @name Arbitrary file write during archive extraction ("Zip Slip")
3- * @description Extracting files from a malicious archive without validating that the
4- * destination file path is within the destination directory can cause files outside
5- * the destination directory to be overwritten .
2+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3+ * @description Accessing filesystem paths built from the name of an archive entry without
4+ * validating that the destination file path is within the destination directory
5+ * can allow an attacker to access unexpected resources .
66 * @kind path-problem
77 * @id java/zipslip
88 * @problem.severity error
Original file line number Diff line number Diff line change 44<qhelp >
55
66<overview >
7- <p >Extracting files from a malicious zip archive without validating that the destination file path
8- is within the destination directory can cause files outside the destination directory to be
9- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
7+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8+ destination file path is within the destination directory can allow an attacker to access
9+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
1010archive paths.</p >
1111
1212<p >Zip archives contain archive entries representing each file in the archive. These entries
1313include a file path for the entry, but these file paths are not restricted and may contain
1414unexpected special elements such as the directory traversal element (<code >..</code >). If these
15- file paths are used to determine an output file to write the contents of the archive item to, then
16- the file may be written to an unexpected location. This can result in sensitive information being
15+ file paths are used to create a filesystem path, then a file operation may happen in an
16+ unexpected location. This can result in sensitive information being
1717revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
1818files.</p >
1919
Original file line number Diff line number Diff line change 11/**
2- * @name Arbitrary file write during zip extraction ("Zip Slip")
3- * @description Extracting files from a malicious zip archive without validating that the
4- * destination file path is within the destination directory can cause files outside
5- * the destination directory to be overwritten .
2+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3+ * @description Accessing filesystem paths built from the name of an archive entry without
4+ * validating that the destination file path is within the destination directory
5+ * can allow an attacker to access unexpected resources .
66 * @kind path-problem
77 * @id js/zipslip
88 * @problem.severity error
Original file line number Diff line number Diff line change 44<qhelp >
55
66<overview >
7- <p >Extracting files from a malicious zip archive without validating that the destination file path
8- is within the destination directory can cause files outside the destination directory to be
9- overwritten , due to the possible presence of directory traversal elements (<code >..</code >) in
7+ <p >Accessing filesystem paths built from the name of an archive entry without validating that the
8+ destination file path is within the destination directory can allow an attacker to access
9+ unexpected resources , due to the possible presence of directory traversal elements (<code >..</code >) in
1010archive paths.</p >
1111
1212<p >Zip archives contain archive entries representing each file in the archive. These entries
1313include a file path for the entry, but these file paths are not restricted and may contain
1414unexpected special elements such as the directory traversal element (<code >..</code >). If these
15- file paths are used to determine an output file to write the contents of the archive item to, then
16- the file may be written to an unexpected location. This can result in sensitive information being
15+ file paths are used to create a filesystem path, then a file operation may happen in an
16+ unexpected location. This can result in sensitive information being
1717revealed or deleted, or an attacker being able to influence behavior by modifying unexpected
1818files.</p >
1919
Original file line number Diff line number Diff line change 11/**
2- * @name Arbitrary file write during archive extraction ("Zip Slip")
3- * @description Extracting files from a malicious archive without validating that the
4- * destination file path is within the destination directory can cause files outside
5- * the destination directory to be overwritten .
2+ * @name Arbitrary file access during archive extraction ("Zip Slip")
3+ * @description Accessing filesystem paths built from the name of an archive entry without
4+ * validating that the destination file path is within the destination directory
5+ * can allow an attacker to access unexpected resources .
66 * @kind path-problem
77 * @id py/zipslip
88 * @problem.severity error
You can’t perform that action at this time.
0 commit comments