First published: Mon Jul 10 2023(Updated: )
It was found that the ResponseBodyHandlers class implementation in the Networking/HTTP client component of OpenJDK failed to check for special characters embedded in file name parameters. A malicious user able to make a Java application perform an HTTP request to an attacker provided URL could use this flaw to possibly carry out a path traversal attack.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2221626 is classified as a moderate severity vulnerability.
To fix REDHAT-BUG-2221626, update your OpenJDK to the latest patched version as recommended by your vendor.
REDHAT-BUG-2221626 allows a malicious user to exploit vulnerabilities in HTTP requests, potentially leading to arbitrary file access.
REDHAT-BUG-2221626 primarily affects OpenJDK 17.
You can determine vulnerability to REDHAT-BUG-2221626 by checking if your application makes HTTP requests that include user-controlled filenames.