Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8m5h-hrqm-pxm2

Опубликовано: 27 апр. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Path traversal in the OWASP Enterprise Security API

Impact

The default implementation of Validator.getValidDirectoryPath(String, String, File, boolean) may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.

Patches

This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.

Workarounds

Yes; in theory, one could write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected DefaultValidator class and then overriding the affected getValidDirectoryPath() to correct the issue. However, this is not recommended.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.owasp.esapi:esapi

maven
Затронутые версииВерсия исправления

<= 2.2.3.1

2.3.0.0

EPSS

Процентиль: 59%
0.00387
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
nvd
почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
debian
почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web ...

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость функции Validator.getValidDirectoryPath(String, String, File, boolean) библиотеки управления безопасностью веб-приложений ESAPI (OWASP Enterprise Security API), позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 59%
0.00387
Низкий

7.5 High

CVSS3

Дефекты

CWE-22