
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry. The vulnerability was discovered and reported on July 24, 2023, affecting the Zip library for Swift programming language (Ostorlab Blog, GitHub Issue).
The vulnerability exists in the unzipFile function where the package does not validate paths coming from zip entries. The pathString from the zip entry is directly appended to the destination directory without any sanitization, allowing for path traversal attacks. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
This vulnerability could allow attackers to write files outside the intended extraction directory, potentially overwriting sensitive user data. In some cases, this could lead to code execution if an attacker manages to overwrite application files (Ostorlab Blog).
Users should upgrade to a patched version of the Zip library. The vulnerability is similar to the previously known Zip Slip vulnerability, and proper path validation should be implemented to ensure extracted files remain within the intended directory (Snyk Research).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."