stakira OpenUtau avant 0.0.991 ZIP Archive VoicebankInstaller.cs VoicebankInstaller directory traversal

Une vulnérabilité classée critique a été trouvée dans stakira OpenUtau. Affecté par cette vulnérabilité est la fonction VoicebankInstaller du fichier OpenUtau.Core/Classic/VoicebankInstaller.cs du composant ZIP Archive Handler. A cause de la manipulation avec une valeur d'entrée inconnue mène à une vulnérabilité de classe directory traversal. La notice d'information est disponible en téléchargement sur github.com. Cette vulnérabilité est identifiée comme CVE-2022-4880. L'attaque ne peut être seulement réalisée au sein du réseau local. Des details techniques sont connus. Il est déclaré comme non défini. Mettre à jour à la version 0.0.991 élimine cette vulnérabilité. La mise à jour est disponible au téléchargment sur github.com. Le correctif est disponible au téléchargement sur github.com. La meilleure solution suggérée pour atténuer le problème est de mettre à jour à la dernière version. Une solution envisageable a été publiée avant et non après après la publication de la vulnérabilité.

Domaine07/01/2023 14:0029/01/2023 21:4829/01/2023 22:01
urlhttps://github.com/stakira/OpenUtau/pull/544https://github.com/stakira/OpenUtau/pull/544https://github.com/stakira/OpenUtau/pull/544
nameUpgradeUpgradeUpgrade
upgrade_version0.0.9910.0.9910.0.991
upgrade_urlhttps://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991https://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991https://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991
patch_name849a0a6912aac8b1c28cc32aa1132a3140caff4a849a0a6912aac8b1c28cc32aa1132a3140caff4a849a0a6912aac8b1c28cc32aa1132a3140caff4a
patch_urlhttps://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4ahttps://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4ahttps://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4a
advisoryquotePrevent from zip slip attack / 防范zip上级文件夹攻击Prevent from zip slip attack / 防范zip上级文件夹攻击Prevent from zip slip attack / 防范zip上级文件夹攻击
cveCVE-2022-4880CVE-2022-4880CVE-2022-4880
responsibleVulDBVulDBVulDB
date1673046000 (07/01/2023)1673046000 (07/01/2023)1673046000 (07/01/2023)
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.25.25.2
cvss2_vuldb_tempscore4.54.54.5
cvss3_vuldb_basescore5.55.55.5
cvss3_vuldb_tempscore5.35.35.3
cvss3_meta_basescore5.55.56.9
cvss3_meta_tempscore5.35.36.9
price_0day$0-$5k$0-$5k$0-$5k
vendorstakirastakirastakira
nameOpenUtauOpenUtauOpenUtau
componentZIP Archive HandlerZIP Archive HandlerZIP Archive Handler
fileOpenUtau.Core/Classic/VoicebankInstaller.csOpenUtau.Core/Classic/VoicebankInstaller.csOpenUtau.Core/Classic/VoicebankInstaller.cs
functionVoicebankInstallerVoicebankInstallerVoicebankInstaller
cwe22 (directory traversal)22 (directory traversal)22 (directory traversal)
risk222
cvss3_vuldb_acLLL
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
identifier544544544
cve_assigned1673046000 (07/01/2023)1673046000 (07/01/2023)
cve_nvd_summaryA vulnerability was found in stakira OpenUtau. It has been classified as critical. This affects the function VoicebankInstaller of the file OpenUtau.Core/Classic/VoicebankInstaller.cs of the component ZIP Archive Handler. The manipulation leads to path traversal. Upgrading to version 0.0.991 is able to address this issue. The name of the patch is 849a0a6912aac8b1c28cc32aa1132a3140caff4a. It is recommended to upgrade the affected component. The identifier VDB-217617 was assigned to this vulnerability.A vulnerability was found in stakira OpenUtau. It has been classified as critical. This affects the function VoicebankInstaller of the file OpenUtau.Core/Classic/VoicebankInstaller.cs of the component ZIP Archive Handler. The manipulation leads to path traversal. Upgrading to version 0.0.991 is able to address this issue. The name of the patch is 849a0a6912aac8b1c28cc32aa1132a3140caff4a. It is recommended to upgrade the affected component. The identifier VDB-217617 was assigned to this vulnerability.
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore5.2
cvss3_nvd_basescore9.8
cvss3_cna_basescore5.5
cvss3_nvd_avN
cvss3_nvd_acL

Interested in the pricing of exploits?

See the underground prices here!