Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/multi/fileformat/zip_slip.md
Views: 11788
Description
This is a generic arbitrary file overwrite technique, which typically results in remote command execution. This targets a simple yet widespread vulnerability that has been seen affecting a variety of popular products including HP, Amazon, Apache, Cisco, etc. The idea is that often archive extraction libraries have no mitigations against directory traversal attacks. If an application uses it, there is a risk when opening an archive that is maliciously modified, and result in the embedded payload being written to an arbitrary location (such as a web root), and result in remote code execution.
Vulnerable Application
Since this is a generic module, it does not target a specific application. However, what it targets is potentially unsafe TAR extraction libraries, so if you happen to notice that, then you can consider using this.
For example, let's say you have a Python library that has code that can extract a TAR file like this:
The above will extract a TAR file, but the extractall
function does not have any protection (especially against directory traversal attacks), so it's dangerous.
An example that is safe from the attack is the tar
command, for example:
Verification Steps
Save the above Python script
Generate the malicious TAR file
Run Python on the TAR file: