You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
mend-for-github-combot
changed the title
CVE-2022-4244 (Medium) detected in plexus-utils-1.2.jar
CVE-2022-4244 (High) detected in plexus-utils-1.2.jar
Dec 3, 2023
CVE-2022-4244 - High Severity Vulnerability
Vulnerable Library - plexus-utils-1.2.jar
Path to dependency file: /plugins/plexus/pom.xml
Path to vulnerable library: /root/.m2/repository/org/codehaus/plexus/plexus-utils/1.2/plexus-utils-1.2.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
Publish Date: 2023-09-25
URL: CVE-2022-4244
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-09-25
Fix Resolution (org.codehaus.plexus:plexus-utils): 3.0.24
Direct dependency fix Resolution (org.codehaus.plexus:plexus-container-default): 2.0.0
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: