{"containers":{"cna":{"affected":[{"product":"SUSE Linux Enterprise Server 15","vendor":"SUSE","versions":[{"lessThan":"0.9.2.1537788075.fefaa74:","status":"affected","version":"obs-service-tar_scm","versionType":"custom"}]},{"product":"Factory","vendor":"openSUSE","versions":[{"lessThan":"0.9.2.1537788075.fefaa74","status":"affected","version":"obs-service-tar_scm","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Matthias Gerstner of SUSE"}],"datePublic":"2020-01-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-23","description":"CWE-23: Relative Path Traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-01-06T16:15:38.000Z","orgId":"f81092c5-7f14-476d-80dc-24857f90be84","shortName":"microfocus"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1107944"}],"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1107944","defect":["1107944"],"discovery":"INTERNAL"},"title":"obs-service-extract_file's outfilename parameter allows to write files outside of package directory","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@microfocus.com","DATE_PUBLIC":"2020-01-27T00:00:00.000Z","ID":"CVE-2018-12476","STATE":"PUBLIC","TITLE":"obs-service-extract_file's outfilename parameter allows to write files outside of package directory"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SUSE Linux Enterprise Server 15","version":{"version_data":[{"version_affected":"<","version_name":"obs-service-tar_scm","version_value":"0.9.2.1537788075.fefaa74:"}]}}]},"vendor_name":"SUSE"},{"product":{"product_data":[{"product_name":"Factory","version":{"version_data":[{"version_affected":"<","version_name":"obs-service-tar_scm","version_value":"0.9.2.1537788075.fefaa74"}]}}]},"vendor_name":"openSUSE"}]}},"credit":[{"lang":"eng","value":"Matthias Gerstner of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Relative Path Traversal vulnerability in obs-service-tar_scm of SUSE Linux Enterprise Server 15; openSUSE Factory allows remote attackers with control over a repository to overwrite files on the machine of the local user if a malicious service is executed. This issue affects: SUSE Linux Enterprise Server 15 obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74:. openSUSE Factory obs-service-tar_scm versions prior to 0.9.2.1537788075.fefaa74."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-23: Relative Path Traversal"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1107944","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1107944"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1107944","defect":["1107944"],"discovery":"INTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:38:06.188Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1107944"}]}]},"cveMetadata":{"assignerOrgId":"f81092c5-7f14-476d-80dc-24857f90be84","assignerShortName":"microfocus","cveId":"CVE-2018-12476","datePublished":"2020-01-27T08:30:14.943Z","dateReserved":"2018-06-15T00:00:00.000Z","dateUpdated":"2024-09-16T20:52:13.615Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}