rspec/rules/S6096/impact.adoc

22 lines
910 B
Plaintext

=== What is the potential impact?
A web application is vulnerable to Zip Slip and an attacker is able to exploit
it by submitting an archive he controls.
The files that can be affected are limited by the permission of the process
that runs the application. Worst case scenario: the process runs with root
privileges on Linux, and therefore any file can be affected.
Below are some real-world scenarios that illustrate some impacts of an attacker
exploiting the vulnerability.
==== Override arbitrary files
The application opens the archive to copy its entries to the file system. The
entries' names contain path traversal payloads for existing files in the
system, which are overwritten once the entries are copied. The vulnerability is
exploited to corrupt files critical for the application or operating system to
work properly.
It could result in data being lost or the application being unavailable.