Skip to main content

CVE-2018-1002205: CWE-22 in DotNetZip DotNetZip.Semvered

Medium
VulnerabilityCVE-2018-1002205cvecve-2018-1002205cwe-22
Published: Wed Jul 25 2018 (07/25/2018, 17:00:00 UTC)
Source: CVE
Vendor/Project: DotNetZip
Product: DotNetZip.Semvered

Description

DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:39:36 UTC

Technical Analysis

CVE-2018-1002205 is a directory traversal vulnerability (CWE-22) found in DotNetZip.Semvered versions prior to 1.11.0. DotNetZip.Semvered is a .NET library used for handling ZIP archive files. The vulnerability arises because the library improperly handles ZIP archive entries containing relative path traversal sequences such as '../' (dot dot slash). When an attacker crafts a malicious ZIP archive with such entries, the extraction process can write files outside the intended extraction directory, potentially overwriting arbitrary files on the host system. This type of vulnerability is commonly referred to as 'Zip-Slip'. The CVSS 3.1 base score is 5.5 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), requires user interaction (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Exploitation requires the victim to extract a malicious ZIP archive, which implies user interaction. The main risk is integrity compromise through unauthorized file modification or replacement, which can lead to code execution or system manipulation if critical files are overwritten. There are no known exploits in the wild reported, and no official patches linked in the provided data, but upgrading to version 1.11.0 or later is recommended to mitigate the issue. The vulnerability is relevant to any application or system using vulnerable versions of DotNetZip.Semvered for ZIP extraction, especially in environments where untrusted ZIP files may be processed.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to software development environments, automated processing systems, or any service that extracts ZIP files using vulnerable DotNetZip.Semvered versions. The integrity of systems can be compromised if an attacker convinces a user or automated system to extract a crafted ZIP archive, potentially leading to unauthorized file overwrites, insertion of malicious code, or disruption of application behavior. This can affect software supply chains, internal tools, or customer-facing applications. While the vulnerability does not directly impact confidentiality or availability, the integrity impact can lead to further exploitation, including privilege escalation or persistent backdoors. Organizations in sectors with high reliance on .NET applications, such as finance, manufacturing, and government services, may face increased risk. Additionally, the requirement for user interaction limits remote exploitation but does not eliminate risk in environments where users handle ZIP files from untrusted sources. The absence of known exploits suggests limited active targeting, but the vulnerability remains a concern for secure software development and deployment practices.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Identify all applications and services using DotNetZip.Semvered for ZIP extraction and verify the version in use. 2) Upgrade DotNetZip.Semvered to version 1.11.0 or later, where the vulnerability is fixed. 3) Implement strict validation and sanitization of ZIP archive entries before extraction, ensuring that no path traversal sequences are present. 4) Use extraction libraries or methods that enforce extraction within a designated directory sandbox, preventing files from being written outside intended paths. 5) Educate users and administrators about the risks of extracting ZIP files from untrusted or unknown sources. 6) Employ application whitelisting and file integrity monitoring to detect unauthorized file modifications. 7) Where possible, automate ZIP file scanning and validation as part of CI/CD pipelines or file ingestion workflows to prevent malicious archives from entering production environments. 8) Monitor security advisories for any updates or patches related to DotNetZip.Semvered and apply them promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
snyk
Date Reserved
2018-07-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda65b

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:39:36 PM

Last updated: 8/2/2025, 7:25:25 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats