Description
A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 is able to address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability.
References (4)
Core 4
Core References
Patch, Third Party Advisory
https://github.com/jrspruitt/ubi_reader/commit/d5d68e6b1b9f7070c29df5f67fc060f579ae9139
Issue Tracking, Patch, Third Party Advisory
https://github.com/jrspruitt/ubi_reader/pull/57
Release Notes, Third Party Advisory
https://github.com/jrspruitt/ubi_reader/releases/tag/v0.8.5-master
Third Party Advisory
https://vuldb.com/?id.216146
Scores
CVSS v3
5.4
EPSS
0.0058
EPSS Percentile
69.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (2)
pypi/ubi-reader
0 - 0.8.5PyPI
ubi_reader_project/ubi_reader
< 0.8.0
Published
Dec 17, 2022
Tracked Since
Feb 18, 2026