CVE-2022-23457 in GoldenGate Studio
Zusammenfassung (Englisch)
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Zuständig
GitHub, Inc.
Reservieren
19.01.2022
Veröffentlichung
26.04.2022
Status
Bestätigt
Einträge
VulDB provides additional information and datapoints for this CVE: