Arbitrary file overwrite in Mholt Archiver



Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2024-0406
CWE-ID CWE-73
Exploitation vector Network
Public exploit N/A
Vulnerable software
archiver
Client/Desktop applications / Software for archiving

Vendor mholt (Matt Holt)

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) External Control of File Name or Path

EUVDB-ID: #VU105975

Risk: High

CVSSv4.0: 6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-0406

CWE-ID: CWE-73 - External Control of File Name or Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to overwrite arbitrary files on the system.

The vulnerability exists due to application allows an attacker to control path of the files when extracting data from a .tar archive. A remote attacker can pass specially crafted archive to the application and overwrite arbitrary files on the system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

archiver: 3.0.0 - 3.5.1

CPE2.3 External links

https://access.redhat.com/errata/RHSA-2025:2449
https://access.redhat.com/security/cve/CVE-2024-0406
https://access.redhat.com/security/cve/CVE-2024-0406
https://bugzilla.redhat.com/show_bug.cgi?id=2257749
https://bugzilla.redhat.com/show_bug.cgi?id=2257749


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted archive.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###