CVE-2020-35460: n/a in n/a
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
AI Analysis
Technical Summary
CVE-2020-35460 is a directory traversal vulnerability identified in the Packwood MPXJ library versions prior to 8.3.5. The vulnerability exists in the common/InputStreamHelper.java component, specifically within the zip stream handler flow. This flaw allows an attacker to craft a malicious ZIP archive that, when processed by the vulnerable MPXJ library, can cause files to be written to arbitrary locations on the file system outside the intended extraction directory. This is due to insufficient validation of file paths extracted from the ZIP stream, enabling directory traversal attacks (CWE-22). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can supply a malicious ZIP archive to an application using the vulnerable MPXJ library. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability impact. There are no known exploits in the wild, and no vendor or product information is specified beyond the MPXJ library. The vulnerability is relevant to any software or service that uses the MPXJ library to process ZIP files, especially in contexts where untrusted ZIP files might be ingested.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which the MPXJ library is used within their software stacks, particularly in project management, scheduling, or other applications that handle ZIP archives. Successful exploitation could allow an attacker to overwrite or place malicious files in arbitrary locations on the host system, potentially leading to code execution or persistence if the files are placed in executable paths or configuration directories. This could compromise system integrity and trustworthiness of affected applications. Although the vulnerability does not directly affect confidentiality or availability, the ability to write arbitrary files can facilitate further attacks such as privilege escalation or lateral movement. Organizations processing ZIP files from untrusted sources or integrating third-party software using MPXJ are at higher risk. The medium severity score suggests a moderate threat level, but the lack of known exploits and the requirement to supply a malicious ZIP file limit the immediate risk. Nevertheless, European organizations should be vigilant, especially those in sectors with high reliance on project management tools or software development environments incorporating MPXJ.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all software and services using the MPXJ library, especially versions prior to 8.3.5. 2) Upgrade the MPXJ library to version 8.3.5 or later where the vulnerability is patched. 3) Implement strict input validation and sanitization on ZIP file paths before extraction, ensuring that directory traversal sequences (e.g., '../') are detected and blocked. 4) Employ sandboxing or run extraction processes with least privilege to limit the impact of arbitrary file writes. 5) Monitor file system changes in critical directories for unauthorized modifications. 6) Restrict the acceptance of ZIP files to trusted sources and scan archives for malicious content before processing. 7) Incorporate security testing in the software development lifecycle to detect similar path traversal issues. These steps go beyond generic advice by focusing on library upgrades, secure coding practices, and operational controls tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2020-35460: n/a in n/a
Description
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
AI-Powered Analysis
Technical Analysis
CVE-2020-35460 is a directory traversal vulnerability identified in the Packwood MPXJ library versions prior to 8.3.5. The vulnerability exists in the common/InputStreamHelper.java component, specifically within the zip stream handler flow. This flaw allows an attacker to craft a malicious ZIP archive that, when processed by the vulnerable MPXJ library, can cause files to be written to arbitrary locations on the file system outside the intended extraction directory. This is due to insufficient validation of file paths extracted from the ZIP stream, enabling directory traversal attacks (CWE-22). The vulnerability does not require authentication or user interaction and can be exploited remotely if an attacker can supply a malicious ZIP archive to an application using the vulnerable MPXJ library. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:L) with no confidentiality or availability impact. There are no known exploits in the wild, and no vendor or product information is specified beyond the MPXJ library. The vulnerability is relevant to any software or service that uses the MPXJ library to process ZIP files, especially in contexts where untrusted ZIP files might be ingested.
Potential Impact
For European organizations, the impact of this vulnerability depends on the extent to which the MPXJ library is used within their software stacks, particularly in project management, scheduling, or other applications that handle ZIP archives. Successful exploitation could allow an attacker to overwrite or place malicious files in arbitrary locations on the host system, potentially leading to code execution or persistence if the files are placed in executable paths or configuration directories. This could compromise system integrity and trustworthiness of affected applications. Although the vulnerability does not directly affect confidentiality or availability, the ability to write arbitrary files can facilitate further attacks such as privilege escalation or lateral movement. Organizations processing ZIP files from untrusted sources or integrating third-party software using MPXJ are at higher risk. The medium severity score suggests a moderate threat level, but the lack of known exploits and the requirement to supply a malicious ZIP file limit the immediate risk. Nevertheless, European organizations should be vigilant, especially those in sectors with high reliance on project management tools or software development environments incorporating MPXJ.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all software and services using the MPXJ library, especially versions prior to 8.3.5. 2) Upgrade the MPXJ library to version 8.3.5 or later where the vulnerability is patched. 3) Implement strict input validation and sanitization on ZIP file paths before extraction, ensuring that directory traversal sequences (e.g., '../') are detected and blocked. 4) Employ sandboxing or run extraction processes with least privilege to limit the impact of arbitrary file writes. 5) Monitor file system changes in critical directories for unauthorized modifications. 6) Restrict the acceptance of ZIP files to trusted sources and scan archives for malicious content before processing. 7) Incorporate security testing in the software development lifecycle to detect similar path traversal issues. These steps go beyond generic advice by focusing on library upgrades, secure coding practices, and operational controls tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2020-12-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb1b3
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:57:09 PM
Last updated: 8/14/2025, 11:38:50 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.