CVE-2022-23457 in GoldenGate Studio情報

要約 (英語)

ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

責任者

GitHub, Inc.

予約する

2022年01月19日

公開

2022年04月26日

ステータス

確認済み

エントリ

VulDB provides additional information and datapoints for this CVE:

ソース

Want to stay up to date on a daily basis?

Enable the mail alert feature now!