CVE-2019-14452

EUVD-2019-5641
Sigil before 0.9.16 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
Affected Products (NVD)
VendorProductVersion
sigil-ebooksigil
𝑥
< 0.9.16
flightcrew_projectflightcrew
0.9.2 ≤
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sigil
bookworm
1.9.20+dfsg-2
fixed
bullseye
1.4.3+dfsg-1
fixed
buster
no-dsa
sid
2.2.1+dfsg-1
fixed
stretch
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sigil
bionic
Fixed 0.9.9+dfsg-1ubuntu0.1~esm1
released
disco
Fixed 0.9.13+dfsg-1ubuntu0.1
released
trusty
dne
xenial
Fixed 0.9.5+dfsg-0ubuntu1+esm1
released