Plattform
other
Komponente
arc
Behoben in
1.6.0
CVE-2023-5938 describes a Path Traversal vulnerability discovered in Arc, a file archiving tool. This flaw allows attackers to manipulate archive filenames, leading to arbitrary file extraction and potential system compromise. Versions 0.0 through 1.6.0 are affected, and a fix is available in version 1.6.0.
The core of this vulnerability lies in Arc's insufficient validation of filenames within archives. An attacker can craft a specially designed archive containing filenames that, when processed by Arc, bypass security checks and allow files to be extracted to unexpected locations. This 'zip slip' attack could allow an attacker, particularly an administrator with the ability to provide archives to Arc, to overwrite system files, inject malicious code, or gain unauthorized access to sensitive data. The potential impact is significant, ranging from denial of service to complete system compromise. Successful exploitation could enable an attacker to execute arbitrary commands on the victim's machine, effectively taking control of the system.
CVE-2023-5938 is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, but the vulnerability's nature makes it likely that exploits will emerge. The CVSS score of 8 (HIGH) indicates a significant risk, and the ease of crafting malicious archives suggests a medium probability of exploitation. The vulnerability was publicly disclosed on 2024-05-15.
Organizations and individuals using Arc for file archiving, particularly those who allow users to upload archives or process archives from untrusted sources, are at risk. Systems with legacy Arc installations or those lacking robust file access controls are especially vulnerable.
disclosure
Exploit-Status
EPSS
0.45% (64% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2023-5938 is to upgrade Arc to version 1.6.0 or later, which includes the necessary fixes to properly validate archive filenames. If upgrading immediately is not feasible, consider restricting the types of archives that Arc can process and implementing strict file access controls to limit the potential damage from a successful attack. Monitor system logs for unusual file extraction activity, particularly writes to sensitive system directories. While a WAF or proxy cannot directly prevent this vulnerability, they can be configured to block suspicious archive uploads based on filename patterns or content analysis.
Actualice Arc a la versión 1.6.0 o superior. Esta versión corrige la vulnerabilidad de path traversal 'zip slip' al validar correctamente los nombres de archivo dentro de los archivos. Asegúrese de que la actualización se realice en un entorno de prueba antes de aplicarla a producción.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2023-5938 is a Path Traversal vulnerability in Arc versions 0.0 - 1.6.0, allowing attackers to extract files to arbitrary locations via malicious archives.
If you are using Arc versions 0.0 through 1.6.0, you are potentially affected by this vulnerability. Check your Arc version and upgrade if necessary.
Upgrade Arc to version 1.6.0 or later to remediate the vulnerability. If immediate upgrade is not possible, restrict archive processing and implement file access controls.
As of now, there are no publicly known active exploits for CVE-2023-5938, but the potential impact warrants vigilance.
Refer to the official Arc project website or security advisories for the latest information and updates regarding CVE-2023-5938.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.