CVE-2022-26049: Goomph before 3.37.2 allows malicious zip file to write contents to arbitrary locations
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64131%
CWE
Published
9/12/2022
Updated
1/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.diffplug.gradle:goomph | maven | < 3.37.2 | 3.37.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub commit 25f04f6 shows a security fix in ZipMisc.java where a path validation check was added during zip extraction. The vulnerability description explicitly mentions zip file extraction as the attack vector, and the CWE-22 classification confirms path traversal. The added code in the unzip function validates normalized paths to prevent directory escape, indicating this was the vulnerable function prior to the patch.