Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-36116

Опубликовано: 19 июн. 2024
Источник: nvd
CVSS3: 7.5
CVSS3: 9.8
EPSS Средний

Описание

Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite provides support for JavaDocs files, which are archives that contain documentation for artifacts. Specifically, JavadocEndpoints.kt controller allows to expand the javadoc archive into the server's file system and return its content. The problem is in the way how the archives are expanded, specifically how the new filename is created. The file.name taken from the archive can contain path traversal characters, such as '/../../../anything.txt', so the resulting extraction path can be outside the target directory. If the archive is taken from an untrusted source, such as Maven Central or JitPack for example, an attacker can craft a special archive to overwrite any local file on Reposilite instance. This could lead to remote code execution, for example by placing a new plugin into the '$workspace$/plugins' directory. Alternatively, an attacker can overwrite

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:reposilite:reposilite:*:*:*:*:*:*:*:*
Версия от 3.3.0 (включая) до 3.5.12 (исключая)

EPSS

Процентиль: 96%
0.28478
Средний

7.5 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-22

Связанные уязвимости

CVSS3: 8.8
github
больше 1 года назад

Path traversal in Reposilite javadoc file expansion (arbitrary file creation/overwrite) (`GHSL-2024-073`)

CVSS3: 7.5
fstec
почти 2 года назад

Уязвимость программного обеспечения для управления репозиториями Reposilite, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.28478
Средний

7.5 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-22