CVE-2022-23457 in GoldenGate Studio
要約 (英語)
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
責任者
GitHub, Inc.
予約する
2022年01月19日
公開
2022年04月26日
ステータス
確認済み
エントリ
VulDB provides additional information and datapoints for this CVE: