Логотип exploitDog
bind:CVE-2022-23457
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23457

Количество 5

Количество 5

ubuntu логотип

CVE-2022-23457

почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-23457

почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-23457

почти 4 года назад

ESAPI (The OWASP Enterprise Security API) is a free, open source, web ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-8m5h-hrqm-pxm2

почти 4 года назад

Path traversal in the OWASP Enterprise Security API

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-04337

почти 4 года назад

Уязвимость функции Validator.getValidDirectoryPath(String, String, File, boolean) библиотеки управления безопасностью веб-приложений ESAPI (OWASP Enterprise Security API), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-23457

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-23457

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

CVSS3: 7.5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2022-23457

ESAPI (The OWASP Enterprise Security API) is a free, open source, web ...

CVSS3: 7.5
0%
Низкий
почти 4 года назад
github логотип
GHSA-8m5h-hrqm-pxm2

Path traversal in the OWASP Enterprise Security API

CVSS3: 7.5
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-04337

Уязвимость функции Validator.getValidDirectoryPath(String, String, File, boolean) библиотеки управления безопасностью веб-приложений ESAPI (OWASP Enterprise Security API), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
0%
Низкий
почти 4 года назад

Уязвимостей на страницу