FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "16.04"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.04"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.10"
}
]
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:flightcrew_project:flightcrew:*:*:*:*:*:sigil:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "0.9.2"
}
],
"source": "CPE_FIELD"
}