CVE-2023-5938

8.0 HIGH

📋 TL;DR

This vulnerability allows attackers to perform path traversal attacks via malicious ZIP archives ('zip slip'), enabling arbitrary file overwrites on the target system. Affected systems include Arc software versions that process archives without proper filename validation. An administrator or user who can upload archives to the system is required for exploitation.

💻 Affected Systems

Products:
  • Arc (specific product name not specified in CVE)
Versions: Not specified in provided CVE details
Operating Systems: All platforms running affected Arc software
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in archive processing functions. Any configuration that processes ZIP archives from untrusted sources is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary command execution by overwriting critical system files or configuration files.

🟠

Likely Case

Data corruption, denial of service, or privilege escalation by overwriting application files or configuration.

🟢

If Mitigated

Limited to file corruption in isolated directories if proper access controls and input validation are implemented.

🌐 Internet-Facing: MEDIUM - Requires archive upload capability which may be exposed via web interfaces or APIs.
🏢 Internal Only: HIGH - Internal users with archive upload privileges can exploit this to gain elevated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to provide malicious archives to the system. The vulnerability is straightforward to exploit once an attacker can upload archives.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://security.nozominetworks.com/NN-2023:16-01

Restart Required: No

Instructions:

1. Check vendor advisory for patch availability. 2. If patch exists, download and apply according to vendor instructions. 3. Validate that archive processing functions now properly validate filenames.

🔧 Temporary Workarounds

Restrict Archive Uploads

all

Disable or restrict functionality that allows uploading or processing of ZIP archives from untrusted sources.

Implement Input Validation

all

Add server-side validation to sanitize archive filenames and prevent path traversal sequences.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can upload archives to the system.
  • Monitor and audit archive processing activities for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Test if the system processes ZIP archives containing files with path traversal sequences (e.g., '../../etc/passwd').

Check Version:

Check Arc software version using vendor-specific commands or configuration files.

Verify Fix Applied:

Verify that attempted path traversal via archive filenames is blocked and logged.

📡 Detection & Monitoring

Log Indicators:

  • Archive processing errors
  • File write attempts to unexpected directories
  • Path traversal patterns in filenames

Network Indicators:

  • Large archive uploads to vulnerable endpoints
  • Unusual archive processing requests

SIEM Query:

source="application_logs" AND (archive_process OR zip_extract) AND (path_traversal OR ../ OR ..\)

🔗 References

📤 Share & Export