VMware offers training and certification to turbo-charge your progress.Learn more
spring-integration-zip , versions prior to 1.0.1, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
This specifically applies to the unzip transformer.
This can only happen if an application using this library accepts and unpacks zip files from untrusted sources.
Users of affected versions should apply the following mitigation:
Or do not unzip untrusted zip files.
This issue was identified and responsibly reported by the Snyk Security Research Team.
The VMware Security Response team provides a single point of contact for the reporting of security vulnerabilities in VMware Tanzu products and coordinates the process of investigating any reported vulnerabilities.
To report a security vulnerability in a VMware service or product please refer to the VMware Security Response Policy.