Overview
- Description
- Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
- Source
- security@apache.org
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:storm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "265E8751-BB87-4F1F-8271-D35DB199C986", "versionEndIncluding": "1.0.6" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:storm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "540EA459-08DF-43BF-B9BD-866B00B977FA", "versionEndIncluding": "1.1.2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:storm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF46C169-8C83-4DA2-AFDC-B41D5B5F5139", "versionEndIncluding": "1.2.1" } ], "operator": "OR" } ] } ]