[原文]Directory traversal vulnerability in QuickZip 3.06.3 allows remote user-assisted attackers to overwrite arbitrary files or directories via .. (dot dot) sequences in filenames within (1) TAR,(2) GZ, and (3) JAR archives. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
QuickZip contains a flaw that allows a remote attacker to place malicious files to arbitrary locations outside of the specified directory. The issue is due to the program not properly sanitizing user input when extracting TAR, GZ and JAR archives, specifically directory traversal style attacks (../../).
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: do not extract untrusted archives, do not extract files as an administrative user.