You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: 152_YOPGFG/downloadResource_HGXZPV/20200920214212/zip4j-1.3.2.jar,20200920214152_YOPGFG/downloadResource_HGXZPV/20200920214212/zip4j-1.3.2.jar
zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
CVE-2018-1002202 - Medium Severity Vulnerability
Vulnerable Library - zip4j-1.3.2.jar
An open source java library to handle zip files
Library home page: http://www.lingala.net/zip4j/
Path to dependency file: CyberWorld/build.gradle
Path to vulnerable library: 152_YOPGFG/downloadResource_HGXZPV/20200920214212/zip4j-1.3.2.jar,20200920214152_YOPGFG/downloadResource_HGXZPV/20200920214212/zip4j-1.3.2.jar
Dependency Hierarchy:
Found in HEAD commit: b9535363a088a5809fb5876244f5880e14505c9b
Found in base branch: master
Vulnerability Details
zip4j before 1.3.3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
Publish Date: 2018-07-25
URL: CVE-2018-1002202
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002202
Release Date: 2018-07-25
Fix Resolution: 1.3.3
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: