22 lines
910 B
Plaintext
22 lines
910 B
Plaintext
=== What is the potential impact?
|
|
|
|
A web application is vulnerable to Zip Slip and an attacker is able to exploit
|
|
it by submitting an archive he controls.
|
|
|
|
The files that can be affected are limited by the permission of the process
|
|
that runs the application. Worst case scenario: the process runs with root
|
|
privileges on Linux, and therefore any file can be affected.
|
|
|
|
Below are some real-world scenarios that illustrate some impacts of an attacker
|
|
exploiting the vulnerability.
|
|
|
|
==== Override arbitrary files
|
|
|
|
The application opens the archive to copy its entries to the file system. The
|
|
entries' names contain path traversal payloads for existing files in the
|
|
system, which are overwritten once the entries are copied. The vulnerability is
|
|
exploited to corrupt files critical for the application or operating system to
|
|
work properly.
|
|
|
|
It could result in data being lost or the application being unavailable.
|