CVE-2022-4773

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a Exploit Patch Third Party Advisory
https://vuldb.com/?ctiid.216919 Permissions Required Third Party Advisory
https://vuldb.com/?id.216919 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudsync_project:cloudsync:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:36

Type Values Removed Values Added
Summary
  • (es) ** NO SOPORTADO CUANDO ASIGNADO ** Se encontró una vulnerabilidad clasificada como problemática en cloudsync. La función getItem del archivo src/main/java/cloudsync/connector/LocalFilesystemConnector.java es afectada por esta vulnerabilidad. La manipulación conduce a path traversal. Es posible lanzar el ataque al servidor local. El nombre del parche es 3ad796833398af257c28e0ebeade68518e0e612a. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216919. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor.

07 Nov 2023, 03:58

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

06 Jan 2023, 17:47

Type Values Removed Values Added
References (MISC) https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a - (MISC) https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade68518e0e612a - Exploit, Patch, Third Party Advisory
References (MISC) https://vuldb.com/?id.216919 - (MISC) https://vuldb.com/?id.216919 - Permissions Required, Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.216919 - (MISC) https://vuldb.com/?ctiid.216919 - Permissions Required, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.3
CPE cpe:2.3:a:cloudsync_project:cloudsync:*:*:*:*:*:*:*:*
First Time Cloudsync Project
Cloudsync Project cloudsync

28 Dec 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-28 00:15

Updated : 2024-05-17 02:16


NVD link : CVE-2022-4773

Mitre link : CVE-2022-4773

CVE.ORG link : CVE-2022-4773


JSON object : View

Products Affected

cloudsync_project

  • cloudsync
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')