Learn about CVE-2020-7667, a vulnerability in github.com/sassoftware/go-rpmutils/cpio before version 0.1.0 allowing Arbitrary File Write via Archive Extraction. Understand the impact, affected systems, exploitation mechanism, and mitigation steps.
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. This vulnerability allows for Arbitrary File Write via Archive Extraction (Zip Slip).
Understanding CVE-2020-7667
This CVE involves a security issue in the CPIO extraction functionality of the specified package, potentially leading to unauthorized file extraction.
What is CVE-2020-7667?
CVE-2020-7667 is a vulnerability in the package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, allowing for arbitrary file write through archive extraction.
The Impact of CVE-2020-7667
The impact of this vulnerability is rated as HIGH severity with a CVSS base score of 7.5. It can lead to unauthorized file writes due to improper path sanitization during archive extraction.
Technical Details of CVE-2020-7667
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability arises from the lack of path sanitization in the CPIO extraction functionality, enabling malicious actors to write files outside the intended directory.
Affected Systems and Versions
Exploitation Mechanism
The exploitation involves manipulating the paths of archived files to include leading and non-leading ".." characters, allowing for file extraction beyond the intended directory.
Mitigation and Prevention
To address CVE-2020-7667, follow these mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates