Public Date:
1584392: CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
A path traversal vulnerability has been discovered in plexus-archiver when extracting a carefully crafted zip file which holds path traversal file names. A remote attacker could use this vulnerability to write files outside the target directory and overwrite existing files with malicious code or vulnerable configurations.

Find out more about CVE-2018-1002200 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (plexus-archiver) RHSA-2018:1836 2018-06-12
Red Hat Software Collections for Red Hat Enterprise Linux 7 RHSA-2018:1837 2018-06-12
Red Hat Software Collections for Red Hat Enterprise Linux 6 (rh-maven33-plexus-archiver) RHSA-2018:1837 2018-06-12

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 opendaylight Will not fix
Red Hat JBoss Fuse 7 plexus-archiver Affected
Red Hat Enterprise Linux 8 plexus-archiver Not affected


Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.

External References

Last Modified