{"id":"CVE-2019-13241","details":"FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.","modified":"2026-04-16T00:11:35.073081774Z","published":"2019-07-04T15:15:11.280Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","extracted_events":[{"last_affected":"16.04"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","extracted_events":[{"last_affected":"18.04"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"18.10"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.04"}]}]},"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/4055-1/"},{"type":"EVIDENCE","url":"https://github.com/Sigil-Ebook/flightcrew/issues/52"},{"type":"EVIDENCE","url":"https://salvatoresecurity.com/fun-with-fuzzers-how-i-discovered-three-vulnerabilities-part-3-of-3/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sigil-ebook/flightcrew","events":[{"introduced":"0"},{"last_affected":"2df9bdb1cba153c85850846de14ee37997736e7e"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.9.2"}]}}],"versions":["0.7.2","0.9.0","0.9.1","0.9.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13241.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}