CVE-2014-0809
CVSS4.3
发布时间 :2014-01-24 10:08:00
修订时间 :2017-08-28 21:34:15
NMCOS    

[原文]Directory traversal vulnerability in the Gapless Player SimZip (aka Simple Zip Viewer) application before 1.2.1 for Android allows remote attackers to overwrite or create arbitrary files via a crafted filename.


[CNNVD]Gapless Player SimZip 目录遍历漏洞(CNNVD-201401-512)

        Gapless Player SimZip(又名Simple Zip Viewer)是一款基于Android平台中的简单压缩包阅读器,它提供多种编码功能,以及支持英文、韩文、中文、日文四种语言菜单。
        安卓平台下Gapless Player SimZip应用1.2及之前版本中存在目录遍历漏洞。远程攻击者可借助特制文件名利用该漏洞覆盖或创建任意文件。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]

- CPE (受影响的平台与产品)

cpe:/a:gapless_player:simzip:1.1
cpe:/a:gapless_player:simzip:1.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0809
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0809
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201401-512
(官方数据源) CNNVD

- 其它链接及资源

http://jvn.jp/en/jp/JVN49384502/index.html
(UNKNOWN)  JVN  JVN#49384502
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000008
(UNKNOWN)  JVNDB  JVNDB-2014-000008
https://exchange.xforce.ibmcloud.com/vulnerabilities/90980
(UNKNOWN)  XF  simple-zip-cve20140809-dir-traversal(90980)
https://play.google.com/store/apps/details?id=com.acidzazz.simzip
(UNKNOWN)  CONFIRM  https://play.google.com/store/apps/details?id=com.acidzazz.simzip

- 漏洞信息

Gapless Player SimZip 目录遍历漏洞
中危 路径遍历
2014-01-27 00:00:00 2014-01-27 00:00:00
远程  
        Gapless Player SimZip(又名Simple Zip Viewer)是一款基于Android平台中的简单压缩包阅读器,它提供多种编码功能,以及支持英文、韩文、中文、日文四种语言菜单。
        安卓平台下Gapless Player SimZip应用1.2及之前版本中存在目录遍历漏洞。远程攻击者可借助特制文件名利用该漏洞覆盖或创建任意文件。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://gaplessplayer.wix.com/simzip

- 漏洞信息

102456
Simple Zip Viewer (SimZip) for Android Crafted Filename Traversal Arbitrary File Manipulation
Context Dependent, Mobile Phone / Hand-held Device Input Manipulation
Loss of Integrity Upgrade
Exploit Unknown Vendor Verified

- 漏洞描述

Simple Zip Viewer (SimZip) for Android contains a flaw that allows traversing outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via specially crafted filename. With a specially crafted request, a context-dependent attacker can manipulate arbitrary files.

- 时间线

2014-01-24 Unknow
Unknow Unknow

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 1.2.1, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SimZip CVE-2014-0809 Directory Traversal Vulnerability
Input Validation Error 65149
Yes No
2014-01-24 12:00:00 2014-01-24 12:00:00
Ryohei Koike

- 受影响的程序版本

- 漏洞讨论

SimZip is prone to a directory-traversal vulnerability.

Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to create or overwrite arbitrary files in the context of the application. This may aid in further attacks.

SimZip prior to 1.2.1 are vulnerable.

- 漏洞利用

Attackers can exploit this issue through a browser.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站