Vulnerabilites related to OWASP ESAPI - org.owasp.esapi:esapi
cve-2022-23457
Vulnerability from cvelistv5
Published
2022-04-25 00:00
Modified
2025-04-22 18:14
Severity ?
EPSS score ?
Summary
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OWASP ESAPI | org.owasp.esapi:esapi |
Version: 2.3.0.0 < 2.3.0.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T03:43:45.817Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/", }, { tags: [ "x_transferred", ], url: "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2", }, { tags: [ "x_transferred", ], url: "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt", }, { tags: [ "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20230127-0014/", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-23457", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-04-22T15:43:25.418830Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-22T18:14:19.909Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "org.owasp.esapi:esapi", vendor: "OWASP ESAPI", versions: [ { lessThan: "2.3.0.0", status: "affected", version: "2.3.0.0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-01-27T00:00:00.000Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { url: "https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/", }, { url: "https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2", }, { url: "https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt", }, { url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { url: "https://security.netapp.com/advisory/ntap-20230127-0014/", }, ], source: { discovery: "UNKNOWN", }, title: "Path Traversal in ESAPI", x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-23457", datePublished: "2022-04-25T00:00:00.000Z", dateReserved: "2022-01-19T00:00:00.000Z", dateUpdated: "2025-04-22T18:14:19.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }