Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-29799

Опубликовано: 21 сент. 2022
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 5.5

Описание

A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.

РелизСтатусПримечание
bionic

released

1.7-0ubuntu3.5
devel

not-affected

2.1-2ubuntu0.22.04.2
esm-infra/bionic

released

1.7-0ubuntu3.5
esm-infra/focal

released

2.1-2~ubuntu20.04.3
focal

released

2.1-2~ubuntu20.04.3
impish

released

2.1-2ubuntu0.21.10.2
jammy

released

2.1-2ubuntu0.22.04.2
upstream

pending

2.2.2

Показывать по

EPSS

Процентиль: 70%
0.00651
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
почти 4 года назад

A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.

CVSS3: 5.5
nvd
больше 3 лет назад

A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.

CVSS3: 5.5
debian
больше 3 лет назад

A vulnerability was found in networkd-dispatcher. This flaw exists bec ...

CVSS3: 5.5
github
больше 3 лет назад

A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.

EPSS

Процентиль: 70%
0.00651
Низкий

5.5 Medium

CVSS3