脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
OSPG binwalk WinCE Extraction Plugin winceextract.py read_null_terminated_string path traversal
脆弱性説明
A security vulnerability has been detected in OSPG binwalk up to 2.4.3. This vulnerability affects the function read_null_terminated_string of the file src/binwalk/plugins/winceextract.py of the component WinCE Extraction Plugin. Such manipulation of the argument self.file_name leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project maintainer confirms this issue: "I accept the existence of the Path Traversal vulnerability. However, as stated in the Github link, it reached EOL and as a result no actions should be expected." The GitHub repository mentions, that "[u]sers and contributors should migrate to binwalk v3." This vulnerability only affects products that are no longer supported by the maintainer.
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
脆弱性タイプ
对路径名的限制不恰当(路径遍历)
脆弱性タイトル
Binwalk 路径遍历漏洞
脆弱性説明
Binwalk是ReFirm Labs开源的一种快速、易于使用的工具。用于分析、逆向工程和提取固件图像。 binwalk 2.4.3及之前版本存在路径遍历漏洞,该漏洞源于WinCE Extraction Plugin组件文件src/binwalk/plugins/winceextract.py中函数read_null_terminated_string对参数self.file_name操作不当,可能导致路径遍历。
CVSS情報
N/A
脆弱性タイプ
N/A