Skip to main content

CVE-2020-35460: n/a in n/a

Medium
VulnerabilityCVE-2020-35460cvecve-2020-35460
Published: Mon Dec 14 2020 (12/14/2020, 22:48:19 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.

AI-Powered Analysis

AILast updated: 07/06/2025, 20:57:09 UTC

Technical Analysis

CVE-2020-35460 is a directory traversal vulnerability identified in the Packwood MPXJ library versions prior to 8.3.5. The vulnerability exists in the common/InputStreamHelper.java component, specifically within the zip stream handler flow. This flaw allows an attacker to craft a malicious ZIP archive that, when processed by the vulnerable MPXJ library, can cause files to be written to arbitrary locations on the file system outside the intended extraction directory. This is due to insufficient validation of file paths extracted from the ZIP stream, enabling directory traversal attacks (CWE-22). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can supply a malicious ZIP archive to an application using the vulnerable MPXJ library. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability impact. There are no known exploits in the wild, and no vendor or product information is specified beyond the MPXJ library. The vulnerability is relevant to any software or service that uses the MPXJ library to process ZIP files, especially in contexts where untrusted ZIP files might be ingested.

Potential Impact

For European organizations, the impact of this vulnerability depends on the extent to which the MPXJ library is used within their software stacks, particularly in project management, scheduling, or other applications that handle ZIP archives. Successful exploitation could allow an attacker to overwrite or place malicious files in arbitrary locations on the host system, potentially leading to code execution or persistence if the files are placed in executable paths or configuration directories. This could compromise system integrity and trustworthiness of affected applications. Although the vulnerability does not directly affect confidentiality or availability, the ability to write arbitrary files can facilitate further attacks such as privilege escalation or lateral movement. Organizations processing ZIP files from untrusted sources or integrating third-party software using MPXJ are at higher risk. The medium severity score suggests a moderate threat level, but the lack of known exploits and the requirement to supply a malicious ZIP file limit the immediate risk. Nevertheless, European organizations should be vigilant, especially those in sectors with high reliance on project management tools or software development environments incorporating MPXJ.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory all software and services using the MPXJ library, especially versions prior to 8.3.5. 2) Upgrade the MPXJ library to version 8.3.5 or later where the vulnerability is patched. 3) Implement strict input validation and sanitization on ZIP file paths before extraction, ensuring that directory traversal sequences (e.g., '../') are detected and blocked. 4) Employ sandboxing or run extraction processes with least privilege to limit the impact of arbitrary file writes. 5) Monitor file system changes in critical directories for unauthorized modifications. 6) Restrict the acceptance of ZIP files to trusted sources and scan archives for malicious content before processing. 7) Incorporate security testing in the software development lifecycle to detect similar path traversal issues. These steps go beyond generic advice by focusing on library upgrades, secure coding practices, and operational controls tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-12-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb1b3

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 8:57:09 PM

Last updated: 8/14/2025, 11:38:50 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats