Codehaus Plexus Archiver up to 4.7.1 AbstractUnArchiver symlink
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Codehaus Plexus Archiver up to 4.7.1. It has been declared as critical. Impacted is the function AbstractUnArchiver. The manipulation results in symlink.
This vulnerability is identified as CVE-2023-37460. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
Details
A vulnerability, which was classified as critical, was found in Codehaus Plexus Archiver up to 4.7.1. Affected is the function AbstractUnArchiver. The manipulation with an unknown input leads to a symlink vulnerability. CWE is classifying the issue as CWE-61. The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Plexis Archiver is a collection of Plexus components to create archives or extract archives to a directory with a unified `Archiver`/`UnArchiver` API. Prior to version 4.8.0, using AbstractUnArchiver for extracting an archive might lead to an arbitrary file creation and possibly remote code execution. When extracting an archive with an entry that already exists in the destination directory as a symbolic link whose target does not exist - the `resolveFile()` function will return the symlink's source instead of its target, which will pass the verification that ensures the file will not be extracted outside of the destination directory. Later `Files.newOutputStream()`, that follows symlinks by default, will actually write the entry's content to the symlink's target. Whoever uses plexus archiver to extract an untrusted archive is vulnerable to an arbitrary file creation and possibly remote code execution. Version 4.8.0 contains a patch for this issue.
The weakness was released 07/26/2023 as GHSA-wh3p-fphp-9h2m. The advisory is shared for download at github.com. This vulnerability is traded as CVE-2023-37460 since 07/06/2023. There are known technical details, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 276247 (TencentOS Server 4: plexus-archiver (TSSA-2024:0842)), which helps to determine the existence of the flaw in a target environment.
Upgrading to version 4.8.0 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 54759839fbdf85caf8442076f001d5fd64e0dcb2 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the vulnerability database at Tenable (276247). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.8VulDB Meta Temp Score: 7.8
VulDB Base Score: 5.6
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CNA Base Score: 8.1
CNA Vector (GitHub, Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: SymlinkCWE: CWE-61 / CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 276247
Nessus Name: TencentOS Server 4: plexus-archiver (TSSA-2024:0842)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Plexus Archiver 4.8.0
Patch: 54759839fbdf85caf8442076f001d5fd64e0dcb2
Timeline
07/06/2023 🔍07/26/2023 🔍
07/26/2023 🔍
11/24/2025 🔍
Sources
Advisory: GHSA-wh3p-fphp-9h2mStatus: Confirmed
CVE: CVE-2023-37460 (🔍)
GCVE (CVE): GCVE-0-2023-37460
GCVE (VulDB): GCVE-100-235416
Entry
Created: 07/26/2023 10:17Updated: 11/24/2025 05:37
Changes: 07/26/2023 10:17 (54), 08/18/2023 16:00 (11), 11/24/2025 05:37 (17)
Complete: 🔍
Cache ID: 216:301:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.