{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-50255","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-12-05T20:42:59.378Z","datePublished":"2023-12-27T16:16:51.459Z","dateUpdated":"2024-08-02T22:16:46.183Z"},"containers":{"cna":{"title":"Zip Path Traversal in Deepin-Compressor","problemTypes":[{"descriptions":[{"cweId":"CWE-23","lang":"en","description":"CWE-23: Relative Path Traversal","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-26","lang":"en","description":"CWE-26: Path Traversal: '/dir/../filename'","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2"},{"name":"https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6","tags":["x_refsource_MISC"],"url":"https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6"}],"affected":[{"vendor":"linuxdeepin","product":"developer-center","versions":[{"version":"< 5.12.21","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-12-27T16:16:51.459Z"},"descriptions":[{"lang":"en","value":"Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.\n"}],"source":{"advisory":"GHSA-rw5r-8p9h-3gp2","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:16:46.183Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2"},{"name":"https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/linuxdeepin/deepin-compressor/commit/82f668c78c133873f5094cfab6e4eabc0b70e4b6"}]}]}}