{"uuid": "a0982e40-cd08-4d79-8f46-044ea81d14d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41951", "type": "seen", "source": "https://t.me/arpsyndicate/726", "content": "#ExploitObserverAlert\n\nCVE-2022-41951\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41951. OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in `Oro\\Bundle\\GaufretteBundle\\FileManager::getTemporaryFileName`. With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution. This vulnerability has been fixed in version 5.0.9.", "creation_timestamp": "2023-11-29T11:44:07.000000Z"}