Given specially crafted zip or JAR file, IO.unzip allows writing of arbitrary file. The follow is an example of a malicious entry:
+2018-04-15 22:04:42 ..... 20 20 ../../../../../../root/.ssh/authorized_keys
This would have a potential to overwrite /root/.ssh/authorized_keys. Within sbt's main code, IO.unzip is used in pullRemoteCache task and Resolvers.remote; however many projects use IO.unzip(...) directly to implement custom tasks - https://github.com/search?q=IO.unzip+language%3AScala&type=code&l=Scala&p=1
The problem has been patched in https://github.com/sbt/io/pull/360 sbt 1.9.7 is available with the fix.
A workaround might be use some other library to unzip.
{
"nvd_published_at": "2023-10-23T16:15:09Z",
"severity": "LOW",
"github_reviewed": true,
"github_reviewed_at": "2023-10-24T01:51:04Z",
"cwe_ids": [
"CWE-22"
]
}