CVE-2026-40491
⚪ Do wiadomości
Atak Path Traversal w gdown umożliwia zapis plików poza docelowym katalogiem.
CVSS
6.5
EPSS
0.0%
Exploit
poc
Vendor
wkentaro
Opis źródłowy (NVD)
gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. This allow files to be written outside the intended destination directory, potentially leading to arbitrary file overwrite and Remote Code Execution (RCE). Version 5.2.2 contains a fix.
exploit path-traversal rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-18 03:16:13 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 18:24:32 UTC |
Referencje
- https://github.com/wkentaro/gdown/commit/af569fc6ed300b7974dee66dc51e9f01b57b4dff (security-advisories@github.com) [Patch]
- https://github.com/wkentaro/gdown/releases/tag/v5.2.2 (security-advisories@github.com) [Release Notes]
- https://github.com/wkentaro/gdown/security/advisories/GHSA-76hw-p97h-883f (security-advisories@github.com) [Exploit, Vendor Advisory]