You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tool Description: An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Custom Description: hh
The text was updated successfully, but these errors were encountered:
A high severity vulnerability has been discovered in your project.
Project Name: Node
Scanner Name: trivy
Cwe ID: 1035
Cwe Name: Using Components with Known Vulnerabilities
Cwe Link: https://cwe.mitre.org/data/definitions/1035.html
CVE ID: CVE-2022-1271
Target: redis:latest (debian 11.3)
Packages:
References:
Tool Description: An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
Custom Description: hh
The text was updated successfully, but these errors were encountered: