Description |
- |
An absolute-path traversal flaw has been found in the Erlang/OTP standard-library ZIP routines `zip:unzip/1,2` and `zip:extract/1,2`. |
+ |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. |
|
|
- |
If the caller does not supply the `memory` option, archive entries whose file names start with "/" are written to disk verbatim. An attacker can therefore create or overwrite arbitrary files writable by the Erlang VM. |
+ |
This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. |
|