CVE-2022-23457 in GoldenGate Studioinfo

Zusammenfassung (Englisch)

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Zuständig

GitHub, Inc.

Reservieren

19.01.2022

Veröffentlichung

26.04.2022

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Want to know what is going to be exploited?

We predict KEV entries!