CVE-2022-39296

MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only.
Configurations

Configuration 1 (hide)

cpe:2.3:a:melistechnology:melis-asset-manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://github.com/melisplatform/melis-asset-manager/commit/a0f75918c049aff78953a0bc91c585153595d1bd - Patch, Third Party Advisory () https://github.com/melisplatform/melis-asset-manager/commit/a0f75918c049aff78953a0bc91c585153595d1bd - Patch, Third Party Advisory
References () https://github.com/melisplatform/melis-asset-manager/security/advisories/GHSA-7fj2-rrq6-rphq - Patch, Third Party Advisory () https://github.com/melisplatform/melis-asset-manager/security/advisories/GHSA-7fj2-rrq6-rphq - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.6

Information

Published : 2022-10-11 18:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-39296

Mitre link : CVE-2022-39296

CVE.ORG link : CVE-2022-39296


JSON object : View

Products Affected

melistechnology

  • melis-asset-manager
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')