CVE-2017-5946

EUVD-2017-0236
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
rubyzip_projectrubyzip
𝑥
< 1.2.1
debiandebian_linux
8.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-zip
bookworm
2.3.2-1
fixed
bullseye
2.0.0-2
fixed
sid
2.3.2-1
fixed
trixie
2.3.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libzip-ruby
artful
dne
bionic
dne
cosmic
dne
disco
dne
eoan
dne
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
precise
Fixed 0.9.4-1+deb7u1build0.12.04.1
released
trusty
dne
xenial
dne
yakkety
dne
zesty
dne
ruby-zip
artful
not-affected
bionic
not-affected
cosmic
not-affected
disco
not-affected
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
not-affected
noble
not-affected
precise
dne
trusty
dne
xenial
needed
yakkety
ignored
zesty
not-affected