A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.
                
            References
                    | Link | Resource | 
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-7216 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2249901 | Exploit Issue Tracking Third Party Advisory | 
| https://access.redhat.com/security/cve/CVE-2023-7216 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=2249901 | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2023-7216 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2249901 - Exploit, Issue Tracking, Third Party Advisory | 
13 May 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks. | 
26 Mar 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-59 | 
12 Mar 2024, 17:38
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.3 | 
11 Mar 2024, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, this allows writing files in arbitrary directories through symlinks. | 
19 Feb 2024, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
13 Feb 2024, 00:37
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:gnu:cpio:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
| First Time | Gnu Redhat Gnu cpio Redhat enterprise Linux | |
| CWE | CWE-22 | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2249901 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://access.redhat.com/security/cve/CVE-2023-7216 - Third Party Advisory | 
05 Feb 2024, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-05 15:15
Updated : 2024-11-21 08:45
NVD link : CVE-2023-7216
Mitre link : CVE-2023-7216
CVE.ORG link : CVE-2023-7216
JSON object : View
Products Affected
                gnu
- cpio
redhat
- enterprise_linux
