
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-33544 affects hawtio version 2.17.2, which contains a Path Traversal vulnerability. The vulnerability was discovered in May 2023 and allows attackers to manipulate zip files to store decompressed files in arbitrary locations on the system, potentially leading to file overwrites (NVD).
The vulnerability exists in the 'unzip' method (line 111) of the file hawtio-util/src/main/java/io/hawt/util/Zips.java. The method fails to properly validate file paths when extracting zip archives, allowing malicious zip files to write extracted contents to arbitrary locations on the filesystem. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N (NVD, GitHub Issue).
When exploited, this vulnerability allows attackers to write files to arbitrary locations on the system through directory traversal. This can result in overwriting existing files and potentially lead to more severe security implications depending on the files that are overwritten (GitHub Issue).
The recommended mitigation is to implement proper path validation checks when extracting zip files. A reference implementation can be found in Apache Druid's CompressionUtils.java, which includes verification methods to prevent similar path traversal issues (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."