CVE-2022-4773

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a Exploit Patch Third Party Advisory
https://vuldb.com/?ctiid.216919 Permissions Required Third Party Advisory
https://vuldb.com/?id.216919 Permissions Required Third Party Advisory
https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a Exploit Patch Third Party Advisory
https://vuldb.com/?ctiid.216919 Permissions Required Third Party Advisory
https://vuldb.com/?id.216919 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudsync_project:cloudsync:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a - Exploit, Patch, Third Party Advisory () https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a - Exploit, Patch, Third Party Advisory
References () https://vuldb.com/?ctiid.216919 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.216919 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.216919 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.216919 - Permissions Required, Third Party Advisory
CVSS v2 : unknown
v3 : 3.3
v2 : unknown
v3 : 2.5

07 Nov 2023, 03:58

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Information

Published : 2022-12-28 00:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4773

Mitre link : CVE-2022-4773

CVE.ORG link : CVE-2022-4773


JSON object : View

Products Affected

cloudsync_project

  • cloudsync
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')