CVE-2025-4748 - log back

CVE-2025-4748 edited at 19 Jun 2025 00:21:19
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation.
-
- This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
CVE-2025-4748 edited at 19 Jun 2025 00:19:51
Description
- An absolute-path traversal flaw has been found in the Erlang/OTP standard-library ZIP routines `zip:unzip/1,2` and `zip:extract/1,2`.
+ Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation.
- If the caller does not supply the `memory` option, archive entries whose file names start with "/" are written to disk verbatim. An attacker can therefore create or overwrite arbitrary files writable by the Erlang VM.
+ This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
CVE-2025-4748 edited at 19 Jun 2025 00:17:24
Description
An absolute-path traversal flaw has been found in the Erlang/OTP standard-library ZIP routines `zip:unzip/1,2` and `zip:extract/1,2`.
- If the caller does **not** supply the `memory` option, archive entries whose file names start with "/" are written to disk verbatim. An attacker can therefore create or overwrite arbitrary files writable by the Erlang VM.
+ If the caller does not supply the `memory` option, archive entries whose file names start with "/" are written to disk verbatim. An attacker can therefore create or overwrite arbitrary files writable by the Erlang VM.
CVE-2025-4748 edited at 19 Jun 2025 00:17:02
Description
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation.
+ An absolute-path traversal flaw has been found in the Erlang/OTP standard-library ZIP routines `zip:unzip/1,2` and `zip:extract/1,2`.
+
+ If the caller does **not** supply the `memory` option, archive entries whose file names start with "/" are written to disk verbatim. An attacker can therefore create or overwrite arbitrary files writable by the Erlang VM.
CVE-2025-4748 edited at 19 Jun 2025 00:09:55
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation.
-
- This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
CVE-2025-4748 created at 19 Jun 2025 00:01:36
Severity
+ Medium
Remote
+ Local
Type
+ Arbitrary file overwrite
Description
+ Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation.
+
+ This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
References
+ https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc
+ https://cna.erlef.org/cves/cve-2025-4748.html
+ https://github.com/erlang/otp/pull/9941
Notes