Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn morespring-integration-zip , versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. The previous cve-2018-1263 prevented the framework from unzipping general traversal file names. The special file names, containing a working directory for unzipping, still can slip out of that working directory. This specifically applies to the unzip transformer. This can only happen if an application using this library accepts and unpacks zip files from untrusted sources.
Users of affected versions should apply the following mitigation or do not unzip untrusted zip files:
This issue was discovered and responsibly reported by Trung Pham, Viettel Cyber Security.
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy