Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29425

Опубликовано: 13 апр. 2021
Источник: debian
EPSS Низкий

Описание

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
commons-iofixed2.8.0-1package
commons-iofixed2.6-2+deb10u1busterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/04/12/1

  • https://issues.apache.org/jira/browse/IO-556

EPSS

Процентиль: 69%
0.00606
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
почти 5 лет назад

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

CVSS3: 4.8
redhat
почти 5 лет назад

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

CVSS3: 4.8
nvd
почти 5 лет назад

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

suse-cvrf
почти 5 лет назад

Security update for apache-commons-io

suse-cvrf
почти 5 лет назад

Security update for apache-commons-io

EPSS

Процентиль: 69%
0.00606
Низкий