6.5
CVSSv3

CVE-2019-0191

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

Apache Karaf kar deployer reads .kar archives and extracts the paths from the "repository/" and "resources/" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with ".." directory names and break out of the directories to write arbitrary content to the filesystem. This is the "Zip-slip" vulnerability - snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache karaf

Mailing Lists

A new security advisory has been released for Apache Karaf, that is fixed in recent 423 release CVE-2019-0191: Zip-slip vulnerability in KAR deployer Severity: Low Vendor: The Apache Software Foundation Versions Affected: all versions of Apache Karaf prior to 423 Description: Apache Karaf kar deployer reads kar archives and extracts the ...