Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-23457

Опубликовано: 25 апр. 2022
Источник: debian
EPSS Низкий

Описание

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libowasp-esapi-javafixed2.4.0.0-1package
libowasp-esapi-javano-dsabusterpackage
libowasp-esapi-javano-dsastretchpackage

Примечания

  • https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/

  • https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2

  • https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt

EPSS

Процентиль: 59%
0.00387
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
nvd
почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
github
почти 4 года назад

Path traversal in the OWASP Enterprise Security API

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость функции Validator.getValidDirectoryPath(String, String, File, boolean) библиотеки управления безопасностью веб-приложений ESAPI (OWASP Enterprise Security API), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00387
Низкий