Lucene search

K
githubGitHub Advisory DatabaseGHSA-GWRP-PVRQ-JMWV
HistoryApr 26, 2021 - 4:04 p.m.

Path Traversal and Improper Input Validation in Apache Commons IO

2021-04-2616:04:00
CWE-20
CWE-22
GitHub Advisory Database
github.com
323
apache commons io
path traversal
improper input validation

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.002

Percentile

57.2%

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like “//…/foo”, or “\…\foo”, the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus “limited” path traversal), if the calling code would use the result to construct a path value.

Affected configurations

Vulners
Node
org.smartboot.servletservlet-coreRange0.1.90.6
OR
org.checkerframework.annotatedlibcommons-ioRange2.62.7
OR
org.apache.servicemix.bundlesorg.apache.servicemix.bundles.commons-ioRange1.41.5
OR
org.apache.commonscommons-ioMatch1.3.2
OR
net.hasorcobble-langRange4.4.14.6.2
OR
com.virjarratel-apiRange1.0.01.3.6
OR
com.liferaycom.liferay.sass.compiler.jsassMatch1.0.1
OR
com.diamondq.commoncommon-thirdparty.jcasbinMatch1.4.0
OR
com.cosium.vetvetRange1.03.22
OR
commons-iocommons-ioRange<2.7
VendorProductVersionCPE
org.smartboot.servletservlet-core*cpe:2.3:a:org.smartboot.servlet:servlet-core:*:*:*:*:*:*:*:*
org.checkerframework.annotatedlibcommons-io*cpe:2.3:a:org.checkerframework.annotatedlib:commons-io:*:*:*:*:*:*:*:*
org.apache.servicemix.bundlesorg.apache.servicemix.bundles.commons-io*cpe:2.3:a:org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-io:*:*:*:*:*:*:*:*
org.apache.commonscommons-io1.3.2cpe:2.3:a:org.apache.commons:commons-io:1.3.2:*:*:*:*:*:*:*
net.hasorcobble-lang*cpe:2.3:a:net.hasor:cobble-lang:*:*:*:*:*:*:*:*
com.virjarratel-api*cpe:2.3:a:com.virjar:ratel-api:*:*:*:*:*:*:*:*
com.liferaycom.liferay.sass.compiler.jsass1.0.1cpe:2.3:a:com.liferay:com.liferay.sass.compiler.jsass:1.0.1:*:*:*:*:*:*:*
com.diamondq.commoncommon-thirdparty.jcasbin1.4.0cpe:2.3:a:com.diamondq.common:common-thirdparty.jcasbin:1.4.0:*:*:*:*:*:*:*
com.cosium.vetvet*cpe:2.3:a:com.cosium.vet:vet:*:*:*:*:*:*:*:*
commons-iocommons-io*cpe:2.3:a:commons-io:commons-io:*:*:*:*:*:*:*:*

References

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0.002

Percentile

57.2%