-
-
Notifications
You must be signed in to change notification settings - Fork 775
Closed
Labels
1) Discussion ongoingIssue is opened and assigned but no clear proposal yetIssue is opened and assigned but no clear proposal yet4) proposal for reviewIssue contains clear proposal for add/change somethingIssue contains clear proposal for add/change something_5.0 - prepThis needs to be addressed to prepare 5.0This needs to be addressed to prepare 5.0josh/elar
Description
I was checking this HackerOne report with a $29000 bounty and I found it very interesting. This is different than Zip Slip. In case of Zip Slip we can inject .. in the file path so we can extract our file in a wrong place. In this report, the attacker crafts a malicious symlink to /etc/passwd when the backend extracts it untar_zxf function only changes the permissions and extract the symlink as is, so the attacker was able to read the passwd file!
I believe we need an ASVS item to check for removal of symlinks in the zip files.
elarlang
Metadata
Metadata
Assignees
Labels
1) Discussion ongoingIssue is opened and assigned but no clear proposal yetIssue is opened and assigned but no clear proposal yet4) proposal for reviewIssue contains clear proposal for add/change somethingIssue contains clear proposal for add/change something_5.0 - prepThis needs to be addressed to prepare 5.0This needs to be addressed to prepare 5.0josh/elar