Square Retrofit version versions from (including) 2.0 and 2.5.0 (excluding) contains a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter that can result in By manipulating the URL an attacker could add or delete resources otherwise unavailable to her… This attack appear to be exploitable via An attacker should have access to an encoded path parameter on POST, PUT or DELETE request… This vulnerability appears to have been fixed in 2.5.0 and later.
access.redhat.com/errata/RHSA-2019:3892
github.com/square/retrofit/blob/master/CHANGELOG.md
github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d
ihacktoprotect.com/post/retrofit-path-traversal/
lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E