Published: 17 December 2008
Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
zip is only in php > 5.2.x apart from these patches, libzip was updated to 0.9.0 not sure if it's necessary to fix the issue... seems the issue is not resolved: http://bugs.php.net/bug.php?id=47188 more info: http://news.php.net/php.internals/42758 http://news.php.net/php.internals/42760 http://news.php.net/php.internals/42762 http://news.php.net/php.internals/42796 (proposed patch) http://news.php.net/php.internals/42797 (proposed smaller patch)
Launchpad, Ubuntu, Debian
(zip not present in 5.1)
upstream: http://cvs.php.net/viewvc.cgi/php-src/ext/zip/php_zip.c?hideattic=0&r1=220.127.116.11&r2=18.104.22.168 (incomplete)