First published: Tue Jan 10 2023(Updated: )
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
npm | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22320 is classified as a critical severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2023-22320, it is recommended to update to the latest version of OpenAM that has addressed the vulnerability.
CVE-2023-22320 can be exploited for path traversal attacks, allowing attackers to access restricted files on the server.
CVE-2023-22320 specifically affects OpenAM version 4.1.0.
Exploitation of CVE-2023-22320 can result in unauthorized information disclosure and potential system compromise.