{"id":"CVE-2017-5946","details":"The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses \"../\" pathname substrings to write arbitrary files to the filesystem.","aliases":["GHSA-gcqq-w6gr-h9j9"],"modified":"2026-05-18T05:49:39.692277118Z","published":"2017-02-27T07:59:00.317Z","related":["openSUSE-SU-2024:11352-1","openSUSE-SU-2024:13168-1","openSUSE-SU-2024:14176-1","openSUSE-SU-2025:15126-1","openSUSE-SU-2026:10363-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"vendor_product":"debian:debian_linux"}]},"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3801"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96445"},{"type":"ADVISORY","url":"https://github.com/rubyzip/rubyzip/issues/315"},{"type":"ADVISORY","url":"https://github.com/rubyzip/rubyzip/releases"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rubyzip/rubyzip","events":[{"introduced":"0"},{"fixed":"98f4f2ed9b3a26bb94e8a539d2c3464e0266fc41"}],"database_specific":{"cpe":"cpe:2.3:a:rubyzip_project:rubyzip:*:*:*:*:*:ruby:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"1.2.1"}]}}],"versions":["v1.2.0","v1.1.7","v1.1.6","v1.1.5","v1.1.4","v1.1.3","v1.1.2","v1.1.1","v1.1.0","v1.0.0","v1.0.0.beta1","0.9.9","0.9.7","0.9.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5946.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}