Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn morespring-integration-zip , versions prior to 1.0.2, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. The previous CVE-2018-1261 prevented the framework itself from writing the file. While the framework itself now does not write such files, it does present the errant path to the user application, which could inadvertently write the file using that path.
This specifically applies to the unzip transformer.
This can only happen if an application using this library accepts and unpacks zip files from untrusted sources.
Users of affected versions should apply the following mitigation:
Or do not unzip untrusted zip files.
This issue was identified and responsibly reported by the Snyk Security Research Team and Abago Forgans.
2018-05-11: Initial vulnerability report published
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy