Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn morespring-integration-zip , versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. The previous cve-2018-1263 prevented the framework from unzipping general traversal file names. The special file names, containing a working directory for unzipping, still can slip out of that working directory. This specifically applies to the unzip transformer. This can only happen if an application using this library accepts and unpacks zip files from untrusted sources.
Users of affected versions should apply the following mitigation or do not unzip untrusted zip files:
This issue was discovered and responsibly reported by Trung Pham, Viettel Cyber Security.
The VMware Security Response team provides a single point of contact for the reporting of security vulnerabilities in VMware Tanzu products and coordinates the process of investigating any reported vulnerabilities.
To report a security vulnerability in a VMware service or product please refer to the VMware Security Response Policy.