First published: Mon Apr 25 2022(Updated: )
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OWASP Enterprise Security API | <2.3.0.0 | |
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
Netapp Active Iq Unified Manager Linux | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp OnCommand Workflow Automation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23457 is a vulnerability in the ESAPI (The OWASP Enterprise Security API) library that allows an attacker to manipulate directory paths in an insecure manner.
The severity level of CVE-2022-23457 is critical with a CVSS score of 9.8.
CVE-2022-23457 affects the following software: OWASP Enterprise Security API (up to version 2.3.0.0), Oracle WebLogic Server (version 12.2.1.3.0 and 12.2.1.4.0), Oracle WebLogic Server (version 14.1.1.0.0), Netapp Active Iq Unified Manager, Apple iPadOS, Apple watchOS, and NetApp OnCommand Workflow Automation.
An attacker can exploit CVE-2022-23457 by supplying a malicious input string that can be incorrectly treated as a child directory of a specified path, leading to potential directory traversal attacks.
Yes, patches and fixes are available for CVE-2022-23457. It is recommended to update to a version of the affected software that includes the fix or apply the necessary security patches provided by the vendor.