CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
49.8%
Veeam is aware of the Zip Slip Vulnerability, which affects jobs with the guest file system indexing option enabled.
Zip Slip is an arbitrary file overwrite vulnerability in multiple ZIP decompression algorithm implementations that affects thousands of software products across many ecosystems. The vulnerability is exploited using a specially crafted zip archive that holds path traversal filenames. A path traversal filename is a malicious filename that when chained to the target extraction directory, results in the final path existing outside of the target folder . For instance, if a zip archive were to contain a file called “…/…/file.exe”, it would break out of the target folder when extracted.
We highly recommend patching this vulnerability as soon as possible, as vulnerable code samples are actively being hand crafted and shared in developer communities for all major platforms.
Zip library (DotNetZip) CVE-2018-1002205
A hotfix for Zip Slip and another similar vulnerability in guest file system indexing functionality is available for the following versions of Veeam Backup & Replication:
**NB!**The hotfix is already included in 9.5 update 3a!
The hotfix contains the following files: Ionic.Zip.dll and Veeam.Backup.Common.dll
Steps to apply the hotfix:
This hotfix is to be applied to the Veeam Backup Server.
Find Ionic.Zip.dll and rename to Ionic.Zip.dll_Original
Find Veeam.Backup.Common.dll and rename to Veeam.Backup.Common.dll_Original
Copy the Ionic.Zip.dll and Veeam.Backup Common.dll from the hotfix bundle and copy to C:\Program Files\Veeam\Backup and Replication\Backup Catalog
Find Ionic.Zip.dll and rename to Ionic.Zip.dll_Original
Find Veeam.Backup.Common.dll and rename to Veeam.Backup.Common.dll_Original
Copy the Ionic.Zip.dll and Veeam.Backup Common.dll from the hotfix bundle and copy to C:\Program Files\Veeam\Backup and Replication\Enterprise Manager
Be sure that you have renamed and replaced the dll files found in the following two folders with the dlls found in the hotfix:
C:\Program Files\Veeam\Backup and Replication\Backup Catalog
C:\Program Files\Veeam\Backup and Replication\Enterprise Manager
Start all Veeam services (PowerShell: gsv Veeam* | sasv)
**Note:**The only known angle of attack for leveraging these vulnerabilities against Veeam Backup & Replication involves Window and Linux guest file system indexing functionality. As such, you don't have to install this hotfix unless you have guest file system indexing enabled in any of your Veeam backup jobs.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
49.8%