‘Zip Slip’ vulnerability affects projects across multiple coding languages and companies
Researchers at cybersecurity firm Synk Ltd. have uncovered a new vulnerability that affects thousands of projects, including ones designed across multiple programming languages used by some of the largest companies in the business.
Dubbed “Zip Slip,” the issue is an arbitrary file overwrite vulnerability — that is, the ability to overwrite an existing file. It’s triggered by a directory traversal attack, an HTTP attack that allows attackers to access restricted directories, while extracting files from an archive.
As the name suggests, the vulnerability relates to archiving formats such as the well-known ZIP format but also covers a range of others, including tar, jar, war, cpio, apk, rar and 7z. According to the researchers, the vulnerability can lead to situations where an attacker can unzip files outside the normal unzip path and overwrite sensitive files.
The files that can be overwritten include those coded in JavaScript, Ruby, .NET and Go, but it’s especially prevalent in Java and affects thousands of projects, including ones from Hewlett Packard Enterprise Co., Amazon.com Inc., Apache open-source projects, Pivotal Software Inc. and many more.
“The premise of the directory traversal vulnerability is that an attacker can gain access to parts of the file system outside of the target folder in which they should reside,” the researchers explained. “The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine. The vulnerability can also cause damage by overwriting configuration files or other sensitive resources, and can be exploited on both client (user) machines and servers.”
Along with publishing a technical paper explaining the vulnerability, the researchers also published details of a proof of concept attack using the method.
“Given the severity and widespread nature of the ZipSlip vulnerability, I very strongly recommend you spend some time ensuring you are not vulnerable either through other libraries or your own code,” Synk’s Danny Grander wrote in a blog post that included the details of the proof-of-concept attack.
Image: Synk
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.