{"api_version":"1","generated_at":"2026-05-14T03:46:40+00:00","cve":"CVE-2021-22114","urls":{"html":"https://cve.report/CVE-2021-22114","api":"https://cve.report/api/cve/CVE-2021-22114.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-22114","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-22114"},"summary":{"title":"CVE-2021-22114","description":"Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.","state":"PUBLIC","assigner":"security@vmware.com","published_at":"2021-03-01 18:15:00","updated_at":"2021-03-09 17:32:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://tanzu.vmware.com/security/cve-2021-22114","name":"https://tanzu.vmware.com/security/cve-2021-22114","refsource":"MISC","tags":["Vendor Advisory"],"title":"CVE-2021-22114: Zip-slip mitigation bypass in Spring Integration Zip extension | Security | VMware Tanzu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-22114","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22114","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"22114","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"spring_integration_zip","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"22114","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"spring_integration_zip","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-22114","ASSIGNER":"security@vmware.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Spring Integration Zip extension","version":{"version_data":[{"version_value":"spring-integration-zip versions prior to 1.0.4"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Arbitrary file write vulnerability"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://tanzu.vmware.com/security/cve-2021-22114","url":"https://tanzu.vmware.com/security/cve-2021-22114"}]},"description":{"description_data":[{"lang":"eng","value":"Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder."}]}},"nvd":{"publishedDate":"2021-03-01 18:15:00","lastModifiedDate":"2021-03-09 17:32:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vmware:spring_integration_zip:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"22114","Ordinal":"196809","Title":"CVE-2021-22114","CVE":"CVE-2021-22114","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"22114","Ordinal":"1","NoteData":"Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"22114","Ordinal":"2","NoteData":"2021-03-01","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"22114","Ordinal":"3","NoteData":"2021-03-01","Type":"Other","Title":"Modified"}]}}}