CVE-2018-1002205: CWE-22 in DotNetZip DotNetZip.Semvered
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
AI Analysis
Technical Summary
CVE-2018-1002205 is a directory traversal vulnerability (CWE-22) found in DotNetZip.Semvered versions prior to 1.11.0. DotNetZip.Semvered is a .NET library used for handling ZIP archive files. The vulnerability arises because the library improperly handles ZIP archive entries containing relative path traversal sequences such as '../' (dot dot slash). When an attacker crafts a malicious ZIP archive with such entries, the extraction process can write files outside the intended extraction directory, potentially overwriting arbitrary files on the host system. This type of vulnerability is commonly referred to as 'Zip-Slip'. The CVSS 3.1 base score is 5.5 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), requires user interaction (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Exploitation requires the victim to extract a malicious ZIP archive, which implies user interaction. The main risk is integrity compromise through unauthorized file modification or replacement, which can lead to code execution or system manipulation if critical files are overwritten. There are no known exploits in the wild reported, and no official patches linked in the provided data, but upgrading to version 1.11.0 or later is recommended to mitigate the issue. The vulnerability is relevant to any application or system using vulnerable versions of DotNetZip.Semvered for ZIP extraction, especially in environments where untrusted ZIP files may be processed.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to software development environments, automated processing systems, or any service that extracts ZIP files using vulnerable DotNetZip.Semvered versions. The integrity of systems can be compromised if an attacker convinces a user or automated system to extract a crafted ZIP archive, potentially leading to unauthorized file overwrites, insertion of malicious code, or disruption of application behavior. This can affect software supply chains, internal tools, or customer-facing applications. While the vulnerability does not directly impact confidentiality or availability, the integrity impact can lead to further exploitation, including privilege escalation or persistent backdoors. Organizations in sectors with high reliance on .NET applications, such as finance, manufacturing, and government services, may face increased risk. Additionally, the requirement for user interaction limits remote exploitation but does not eliminate risk in environments where users handle ZIP files from untrusted sources. The absence of known exploits suggests limited active targeting, but the vulnerability remains a concern for secure software development and deployment practices.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify all applications and services using DotNetZip.Semvered for ZIP extraction and verify the version in use. 2) Upgrade DotNetZip.Semvered to version 1.11.0 or later, where the vulnerability is fixed. 3) Implement strict validation and sanitization of ZIP archive entries before extraction, ensuring that no path traversal sequences are present. 4) Use extraction libraries or methods that enforce extraction within a designated directory sandbox, preventing files from being written outside intended paths. 5) Educate users and administrators about the risks of extracting ZIP files from untrusted or unknown sources. 6) Employ application whitelisting and file integrity monitoring to detect unauthorized file modifications. 7) Where possible, automate ZIP file scanning and validation as part of CI/CD pipelines or file ingestion workflows to prevent malicious archives from entering production environments. 8) Monitor security advisories for any updates or patches related to DotNetZip.Semvered and apply them promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2018-1002205: CWE-22 in DotNetZip DotNetZip.Semvered
Description
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
AI-Powered Analysis
Technical Analysis
CVE-2018-1002205 is a directory traversal vulnerability (CWE-22) found in DotNetZip.Semvered versions prior to 1.11.0. DotNetZip.Semvered is a .NET library used for handling ZIP archive files. The vulnerability arises because the library improperly handles ZIP archive entries containing relative path traversal sequences such as '../' (dot dot slash). When an attacker crafts a malicious ZIP archive with such entries, the extraction process can write files outside the intended extraction directory, potentially overwriting arbitrary files on the host system. This type of vulnerability is commonly referred to as 'Zip-Slip'. The CVSS 3.1 base score is 5.5 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), requires user interaction (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Exploitation requires the victim to extract a malicious ZIP archive, which implies user interaction. The main risk is integrity compromise through unauthorized file modification or replacement, which can lead to code execution or system manipulation if critical files are overwritten. There are no known exploits in the wild reported, and no official patches linked in the provided data, but upgrading to version 1.11.0 or later is recommended to mitigate the issue. The vulnerability is relevant to any application or system using vulnerable versions of DotNetZip.Semvered for ZIP extraction, especially in environments where untrusted ZIP files may be processed.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to software development environments, automated processing systems, or any service that extracts ZIP files using vulnerable DotNetZip.Semvered versions. The integrity of systems can be compromised if an attacker convinces a user or automated system to extract a crafted ZIP archive, potentially leading to unauthorized file overwrites, insertion of malicious code, or disruption of application behavior. This can affect software supply chains, internal tools, or customer-facing applications. While the vulnerability does not directly impact confidentiality or availability, the integrity impact can lead to further exploitation, including privilege escalation or persistent backdoors. Organizations in sectors with high reliance on .NET applications, such as finance, manufacturing, and government services, may face increased risk. Additionally, the requirement for user interaction limits remote exploitation but does not eliminate risk in environments where users handle ZIP files from untrusted sources. The absence of known exploits suggests limited active targeting, but the vulnerability remains a concern for secure software development and deployment practices.
Mitigation Recommendations
European organizations should take the following specific actions: 1) Identify all applications and services using DotNetZip.Semvered for ZIP extraction and verify the version in use. 2) Upgrade DotNetZip.Semvered to version 1.11.0 or later, where the vulnerability is fixed. 3) Implement strict validation and sanitization of ZIP archive entries before extraction, ensuring that no path traversal sequences are present. 4) Use extraction libraries or methods that enforce extraction within a designated directory sandbox, preventing files from being written outside intended paths. 5) Educate users and administrators about the risks of extracting ZIP files from untrusted or unknown sources. 6) Employ application whitelisting and file integrity monitoring to detect unauthorized file modifications. 7) Where possible, automate ZIP file scanning and validation as part of CI/CD pipelines or file ingestion workflows to prevent malicious archives from entering production environments. 8) Monitor security advisories for any updates or patches related to DotNetZip.Semvered and apply them promptly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- snyk
- Date Reserved
- 2018-07-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda65b
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:39:36 PM
Last updated: 2/7/2026, 9:15:41 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.