CVE-2022-21675: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Konloch bytecode-viewer
Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.
AI Analysis
Technical Summary
CVE-2022-21675 is a path traversal vulnerability classified under CWE-22 affecting versions of the Konloch bytecode-viewer (BCV) prior to 2.11.0. BCV is a Java/Android reverse engineering suite used for analyzing bytecode in various archive formats. The vulnerability arises from improper validation of archive extraction paths, allowing specially crafted archives containing directory traversal sequences (e.g., ../../evil.exe) to overwrite arbitrary files on the victim's filesystem during extraction. This type of vulnerability is commonly referred to as "Zip Slip" and can affect multiple archive formats including zip, jar, tar, war, cpio, apk, rar, and 7z. Exploitation enables an attacker to write or overwrite executable files, potentially leading to remote code execution if the overwritten files are executed either manually by the user or automatically by the system. In web application contexts, an attacker could place a web shell within the application directory, facilitating remote command execution and persistent access. The vulnerability does not require prior authentication or user interaction beyond the extraction of the malicious archive. The only effective remediation is upgrading BCV to version 2.11.0 or later, which contains the patch to properly sanitize extraction paths and prevent directory traversal. No alternative workarounds are recommended, and as of the information provided, there are no known exploits in the wild targeting this vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those involved in software development, reverse engineering, or security research that utilize the Konloch bytecode-viewer. Successful exploitation could lead to arbitrary file writes, enabling attackers to overwrite critical system or application files, implant malware, or establish persistent backdoors. This could compromise the confidentiality, integrity, and availability of affected systems. In environments where BCV is integrated into automated workflows or CI/CD pipelines, the risk of widespread compromise increases. Additionally, organizations running web applications that process archives using BCV could face remote code execution attacks, leading to data breaches, service disruption, or lateral movement within networks. Although no active exploits are reported, the ease of exploitation and potential for severe consequences necessitate prompt action. The medium severity rating reflects the balance between the need for user interaction (archive extraction) and the high impact of arbitrary file writes and potential remote code execution.
Mitigation Recommendations
1. Immediate upgrade of all instances of Konloch bytecode-viewer to version 2.11.0 or later to apply the official patch addressing the path traversal vulnerability. 2. Implement strict validation and sanitization of archive contents before extraction, including verifying that extracted file paths do not escape intended directories. 3. Employ sandboxing or containerization for environments where BCV is used to limit the impact of potential exploitation. 4. Restrict permissions of the user accounts running BCV to minimize the ability to overwrite critical system files. 5. Monitor file system changes in directories where archives are extracted, using file integrity monitoring tools to detect unauthorized modifications. 6. Educate users and administrators about the risks of extracting untrusted archives and enforce policies to avoid processing archives from unverified sources. 7. Where possible, integrate automated scanning for malicious archive contents in the workflow before extraction. 8. Maintain up-to-date backups of critical systems and data to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-21675: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Konloch bytecode-viewer
Description
Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA "Zip Slip"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine. The impact of a Zip Slip vulnerability would allow an attacker to create or overwrite existing files on the filesystem. In the context of a web application, a web shell could be placed within the application directory to achieve code execution. All users should upgrade to BCV v2.11.0 when possible to receive a patch. There are no recommended workarounds aside from upgrading.
AI-Powered Analysis
Technical Analysis
CVE-2022-21675 is a path traversal vulnerability classified under CWE-22 affecting versions of the Konloch bytecode-viewer (BCV) prior to 2.11.0. BCV is a Java/Android reverse engineering suite used for analyzing bytecode in various archive formats. The vulnerability arises from improper validation of archive extraction paths, allowing specially crafted archives containing directory traversal sequences (e.g., ../../evil.exe) to overwrite arbitrary files on the victim's filesystem during extraction. This type of vulnerability is commonly referred to as "Zip Slip" and can affect multiple archive formats including zip, jar, tar, war, cpio, apk, rar, and 7z. Exploitation enables an attacker to write or overwrite executable files, potentially leading to remote code execution if the overwritten files are executed either manually by the user or automatically by the system. In web application contexts, an attacker could place a web shell within the application directory, facilitating remote command execution and persistent access. The vulnerability does not require prior authentication or user interaction beyond the extraction of the malicious archive. The only effective remediation is upgrading BCV to version 2.11.0 or later, which contains the patch to properly sanitize extraction paths and prevent directory traversal. No alternative workarounds are recommended, and as of the information provided, there are no known exploits in the wild targeting this vulnerability.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those involved in software development, reverse engineering, or security research that utilize the Konloch bytecode-viewer. Successful exploitation could lead to arbitrary file writes, enabling attackers to overwrite critical system or application files, implant malware, or establish persistent backdoors. This could compromise the confidentiality, integrity, and availability of affected systems. In environments where BCV is integrated into automated workflows or CI/CD pipelines, the risk of widespread compromise increases. Additionally, organizations running web applications that process archives using BCV could face remote code execution attacks, leading to data breaches, service disruption, or lateral movement within networks. Although no active exploits are reported, the ease of exploitation and potential for severe consequences necessitate prompt action. The medium severity rating reflects the balance between the need for user interaction (archive extraction) and the high impact of arbitrary file writes and potential remote code execution.
Mitigation Recommendations
1. Immediate upgrade of all instances of Konloch bytecode-viewer to version 2.11.0 or later to apply the official patch addressing the path traversal vulnerability. 2. Implement strict validation and sanitization of archive contents before extraction, including verifying that extracted file paths do not escape intended directories. 3. Employ sandboxing or containerization for environments where BCV is used to limit the impact of potential exploitation. 4. Restrict permissions of the user accounts running BCV to minimize the ability to overwrite critical system files. 5. Monitor file system changes in directories where archives are extracted, using file integrity monitoring tools to detect unauthorized modifications. 6. Educate users and administrators about the risks of extracting untrusted archives and enforce policies to avoid processing archives from unverified sources. 7. Where possible, integrate automated scanning for malicious archive contents in the workflow before extraction. 8. Maintain up-to-date backups of critical systems and data to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2274
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 6:33:02 PM
Last updated: 8/16/2025, 11:21:14 PM
Views: 16
Related Threats
CVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumCVE-2025-41451: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Danfoss AK-SM8xxA Series
HighCVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.