{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Critical"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"engrampa security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for engrampa is now available for openEuler-22.03-LTS-SP3.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Mate File Archiver is an application for creating and viewing archives files, such as zip, xv, bzip2, cab, rar and other compress formats.\n\nSecurity Fix(es):\n\nEngrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (RCE) on the target. While handling CPIO archives, the Engrampa Archive manager follows symlink, cpio by default will follow stored symlinks while extracting and the Archiver will not check the symlink location, which leads to arbitrary file writes to unintended locations. When the victim extracts the archive, the attacker can craft a malicious cpio or ISO archive to achieve RCE on the target system. This vulnerability was fixed in commit 63d5dfa.\n(CVE-2023-52138)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for engrampa is now available for openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Critical",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"engrampa",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1589",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1589"
			},
			{
				"summary":"CVE-2023-52138",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-52138&packageName=engrampa"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52138"
			},
			{
				"summary":"openEuler-SA-2024-1589 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1589.json"
			}
		],
		"title":"An update for engrampa is now available for openEuler-22.03-LTS-SP3",
		"tracking":{
			"initial_release_date":"2024-05-17T09:17:52+08:00",
			"revision_history":[
				{
					"date":"2024-05-17T09:17:52+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:17:52+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:17:52+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:17:52+08:00",
			"id":"openEuler-SA-2024-1589",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64.rpm",
									"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64.rpm"
								},
								"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-1.24.1-4.oe2203sp3.aarch64.rpm",
									"name":"engrampa-1.24.1-4.oe2203sp3.aarch64.rpm"
								},
								"name":"engrampa-1.24.1-4.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64.rpm",
									"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64.rpm"
								},
								"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-1.24.1-4.oe2203sp3.src.rpm",
									"name":"engrampa-1.24.1-4.oe2203sp3.src.rpm"
								},
								"name":"engrampa-1.24.1-4.oe2203sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64.rpm",
									"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64.rpm"
								},
								"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-1.24.1-4.oe2203sp3.x86_64.rpm",
									"name":"engrampa-1.24.1-4.oe2203sp3.x86_64.rpm"
								},
								"name":"engrampa-1.24.1-4.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64.rpm",
									"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64.rpm"
								},
								"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64",
					"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-1.24.1-4.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.aarch64",
					"name":"engrampa-1.24.1-4.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64",
					"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-1.24.1-4.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.src",
					"name":"engrampa-1.24.1-4.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64",
					"name":"engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-1.24.1-4.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.x86_64",
					"name":"engrampa-1.24.1-4.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64",
					"name":"engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-52138",
			"notes":[
				{
					"text":"Engrampa is an archive manager for the MATE environment. Engrampa is found to be vulnerable to a Path Traversal vulnerability that can be leveraged to achieve full Remote Command Execution (RCE) on the target. While handling CPIO archives, the Engrampa Archive manager follows symlink, cpio by default will follow stored symlinks while extracting and the Archiver will not check the symlink location, which leads to arbitrary file writes to unintended locations. When the victim extracts the archive, the attacker can craft a malicious cpio or ISO archive to achieve RCE on the target system. This vulnerability was fixed in commit 63d5dfa.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64"
					],
					"details":"engrampa security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1589"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.6,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:engrampa-debugsource-1.24.1-4.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:engrampa-1.24.1-4.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:engrampa-debuginfo-1.24.1-4.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2023-52138"
		}
	]
}