wstg icon indicating copy to clipboard operation
wstg copied to clipboard

Upload a malicious symlink in a zip file

Open ImanSharaf opened this issue 2 years ago • 2 comments

I was checking this HackerOne report with a $29000 bounty and I found it very interesting. This is different than Zip Slip. In case of Zip Slip we can inject .. in the file path so we can extract our file in a wrong place. In this report, the attacker crafts a malicious symlink to /etc/passwd when the backend extracts it untar_zxf function only changes the permissions and extract the symlink as is, so the attacker was able to read the passwd file! I believe we need to add this technique to the WSTG!

ImanSharaf avatar Nov 10 '22 00:11 ImanSharaf

Hi Iman! Thanks for flagging this for us.

I had a quick look at it, and still need more time around it to review it :)

ThunderSon avatar Nov 14 '22 01:11 ThunderSon

Hi @ThunderSon, is there any update?

ImanSharaf avatar Mar 18 '23 05:03 ImanSharaf