
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability was discovered in the mholt/archiver package (version 3), identified as CVE-2024-0406. The vulnerability allows attackers to create specially crafted tar files that, when unpacked, can enable access to restricted files or directories. This security flaw was discovered by Stefan Cornelius from Red Hat and has been assigned a CVSS v3 base score of 6.1, indicating a moderate severity level (Red Hat CVE).
The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as Path Traversal. When exploited, it allows the creation or overwriting of files with the user's or application's privileges using the library. The vulnerability affects version 3 of the mholt/archiver package, while version 4 is not affected as it doesn't support this functionality. The CVSS vector for this vulnerability is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N, indicating local attack vector, low attack complexity, no privileges required, and user interaction required (Red Hat CVE, Bugzilla Report).
The vulnerability can lead to multiple security impacts. An attacker can potentially create or overwrite critical files such as programs, libraries, or important data. If the targeted file is used for a security mechanism, the attacker may bypass that mechanism. Additionally, the vulnerability allows reading the contents of unexpected files and exposing sensitive data. In terms of availability, it may enable attackers to overwrite, delete, or corrupt critical files, potentially preventing the product from functioning correctly (Red Hat CVE).
The primary mitigation strategy is to upgrade to mholt/archiver version 4, which is not affected by this vulnerability as it doesn't support the problematic functionality. For systems that cannot be immediately upgraded, careful validation of archive contents before unpacking is recommended (Bugzilla Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."