漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
pacman before 5.1.3 allows directory traversal when installing a remote package via a specified URL "pacman -U <url>" due to an unsanitized file name received from a Content-Disposition header. pacman renames the downloaded package file to match the name given in this header. However, pacman did not sanitize this name, which may contain slashes, before calling rename(). A malicious server (or a network MitM if downloading over HTTP) can send a Content-Disposition header to make pacman place the file anywhere in the filesystem, potentially leading to arbitrary root code execution. Notably, this bypasses pacman's package signature checking. This occurs in curl_download_internal in lib/libalpm/dload.c.
漏洞信息
N/A
漏洞
N/A
漏洞
pacman 路径遍历漏洞
漏洞信息
pacman是一款使用在Linux中的软件包管理器。 pacman 5.1.3之前版本中存在安全漏洞,该漏洞源于程序没有过滤来自Content-Disposition消息报头的文件名称。攻击者可利用该漏洞执行代码。
漏洞信息
N/A
漏洞
N/A