CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In 2022(Directory Traversal)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2022-45921 22 Dir. Trav. 2022-11-28 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
2 CVE-2022-45866 22 Dir. Trav. 2022-11-23 2022-12-04
0.0
None ??? ??? ??? ??? ??? ???
qpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.
3 CVE-2022-45388 22 Dir. Trav. 2022-11-15 2022-11-18
0.0
None ??? ??? ??? ??? ??? ???
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
4 CVE-2022-45381 22 Dir. Trav. 2022-11-15 2022-11-29
0.0
None ??? ??? ??? ??? ??? ???
Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.
5 CVE-2022-45184 22 Dir. Trav. 2022-11-14 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
The Web Server in Ironman Software PowerShell Universal v3.x and v2.x allows for directory traversal outside of the configuration directory, which allows a remote attacker with administrator privilege to create, delete, update, and display files outside of the configuration directory via a crafted HTTP request to particular endpoints in the web server. Patched Versions are 3.5.3 and 3.4.7.
6 CVE-2022-44749 22 Exec Code Dir. Trav. 2022-11-24 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though.
7 CVE-2022-44748 22 Exec Code Dir. Trav. 2022-11-24 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised.
8 CVE-2022-44635 22 Exec Code Dir. Trav. 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
9 CVE-2022-44008 22 Dir. Trav. 2022-11-16 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation, arbitrary local files can be retrieved by accessing the back-end Tomcat server directly.
10 CVE-2022-44006 22 Exec Code Dir. Trav. 2022-11-16 2022-11-20
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation or sanitization of upload filenames, an externally reachable, unauthenticated update function permits writing files outside the intended target location. Achieving remote code execution is possible, e.g., by uploading an executable file.
11 CVE-2022-43753 22 Dir. Trav. 2022-11-10 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10.
12 CVE-2022-43748 22 Dir. Trav. 2022-10-26 2022-10-28
0.0
None ??? ??? ??? ??? ??? ???
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in file operation management in Synology Presto File Server before 2.1.2-1601 allows remote attackers to write arbitrary files via unspecified vectors.
13 CVE-2022-43451 22 +Priv Dir. Trav. 2022-11-03 2022-11-07
0.0
None ??? ??? ??? ??? ??? ???
OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges.
14 CVE-2022-43264 22 Dir. Trav. 2022-11-16 2022-11-18
0.0
None ??? ??? ??? ??? ??? ???
Arobas Music Guitar Pro for iPad and iPhone before v1.10.2 allows attackers to perform directory traversal and download arbitrary files via a crafted web request.
15 CVE-2022-42892 22 Dir. Trav. 2022-11-17 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow directory listing in any folder accessible to the account assigned to the website’s application pool.
16 CVE-2022-42308 22 Dir. Trav. 2022-10-03 2022-10-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can delete arbitrary files by leveraging a path traversal in the pbx_exchange registration code.
17 CVE-2022-42305 22 Dir. Trav. 2022-10-03 2022-10-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to a Path traversal attack through the DiscoveryService service.
18 CVE-2022-42188 22 Dir. Trav. 2022-10-18 2022-10-20
0.0
None ??? ??? ??? ??? ??? ???
In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
19 CVE-2022-42125 22 Dir. Trav. 2022-11-15 2022-11-18
0.0
None ??? ??? ??? ??? ??? ???
Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module.
20 CVE-2022-42123 22 Dir. Trav. 2022-11-15 2022-11-18
0.0
None ??? ??? ??? ??? ??? ???
A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin.
21 CVE-2022-42055 22 Dir. Trav. 2022-10-27 2022-10-31
0.0
None ??? ??? ??? ??? ??? ???
Multiple command injection vulnerabilities in GL.iNet GoodCloud IoT Device Management System Version 1.00.220412.00 via the ping and traceroute tools allow attackers to read arbitrary files on the system.
22 CVE-2022-41920 22 Dir. Trav. 2022-11-17 2022-11-22
0.0
None ??? ??? ??? ??? ??? ???
Lancet is a general utility library for the go programming language. Affected versions are subject to a ZipSlip issue when using the fileutil package to unzip files. This issue has been addressed and a fix will be included in versions 2.1.10 and 1.3.4. Users are advised to upgrade. There are no known workarounds for this issue.
23 CVE-2022-41840 22 Dir. Trav. 2022-11-18 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
Unauth. Directory Traversal vulnerability in Welcart eCommerce plugin <= 2.7.7 on WordPress.
24 CVE-2022-41780 22 Dir. Trav. 2022-10-19 2022-10-24
0.0
None ??? ??? ??? ??? ??? ???
In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.4.0, a directory traversal vulnerability exists in an undisclosed location of the F5OS CLI that allows an attacker to read arbitrary files.
25 CVE-2022-41772 22 Exec Code Dir. Trav. 2022-10-31 2022-11-02
0.0
None ??? ??? ??? ??? ??? ???
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution.
26 CVE-2022-41712 22 Dir. Trav. +Info 2022-11-25 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter.
27 CVE-2022-41670 22 Exec Code Dir. Trav. 2022-11-04 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).
28 CVE-2022-41667 22 Exec Code Dir. Trav. 2022-11-04 2022-11-05
0.0
None ??? ??? ??? ??? ??? ???
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).
29 CVE-2022-41657 22 Exec Code Dir. Trav. 2022-10-31 2022-11-02
0.0
None ??? ??? ??? ??? ??? ???
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution.
30 CVE-2022-41607 22 Dir. Trav. 2022-11-10 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.
31 CVE-2022-41231 22 Dir. Trav. 2022-09-21 2022-09-22
0.0
None ??? ??? ??? ??? ??? ???
Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any config.xml file on the Jenkins controller file system by providing a crafted file name to an API endpoint.
32 CVE-2022-41212 22 Dir. Trav. 2022-11-08 2022-11-09
0.0
None ??? ??? ??? ??? ??? ???
Due to insufficient input validation, SAP NetWeaver Application Server ABAP and ABAP Platform allows an attacker with high level privileges to use a remote enabled function to read a file which is otherwise restricted. On successful exploitation an attacker can completely compromise the confidentiality of the application.
33 CVE-2022-40977 22 Dir. Trav. 2022-11-24 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
34 CVE-2022-40976 22 Dir. Trav. 2022-11-24 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
35 CVE-2022-40742 22 Dir. Trav. File Inclusion 2022-10-31 2022-11-01
0.0
None ??? ??? ??? ??? ??? ???
Mail SQR Expert system has a Local File Inclusion vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary PHP file with .asp file extension under specific system paths, to access and modify partial system information but does not affect service availability.
36 CVE-2022-40734 22 Dir. Trav. 2022-09-14 2022-09-17
0.0
None ??? ??? ??? ??? ??? ???
UniSharp laravel-filemanager (aka Laravel Filemanager) through 2.5.1 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022.
37 CVE-2022-40715 22 Dir. Trav. 2022-09-19 2022-09-21
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in NOKIA 1350OMS R14.2. An Absolute Path Traversal vulnerability exists for a specific endpoint via the logfile parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.
38 CVE-2022-40713 22 Dir. Trav. 2022-09-19 2022-09-21
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in NOKIA 1350OMS R14.2. Multiple Relative Path Traversal issues exist in different specific endpoints via the file parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.
39 CVE-2022-40608 22 Dir. Trav. 2022-09-19 2022-09-21
0.0
None ??? ??? ??? ??? ??? ???
IBM Spectrum Protect Plus 10.1.6 through 10.1.11 Microsoft File Systems restore operation can download any file on the target machine by manipulating the URL with a directory traversal attack. This results in the restore operation gaining access to files which the operator should not have access to. IBM X-Force ID: 235873.
40 CVE-2022-40444 22 Dir. Trav. 2022-09-22 2022-09-23
0.0
None ??? ??? ??? ??? ??? ???
ZZCMS 2022 was discovered to contain a full path disclosure vulnerability via the page /admin/index.PHP? _server.
41 CVE-2022-40443 22 Dir. Trav. +Info 2022-09-22 2022-09-23
0.0
None ??? ??? ??? ??? ??? ???
An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.
42 CVE-2022-40199 22 Dir. Trav. +Info 2022-09-27 2022-09-29
0.0
None ??? ??? ??? ??? ??? ???
Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information.
43 CVE-2022-40123 22 Dir. Trav. 2022-10-03 2022-10-05
0.0
None ??? ??? ??? ??? ??? ???
mojoPortal v2.7 was discovered to contain a path traversal vulnerability via the "f" parameter at /DesignTools/CssEditor.aspx. This vulnerability allows authenticated attackers to read arbitrary files in the system.
44 CVE-2022-40082 22 Dir. Trav. 2022-09-28 2022-09-29
0.0
None ??? ??? ??? ??? ??? ???
Hertz v0.3.0 ws discovered to contain a path traversal vulnerability via the normalizePath function.
45 CVE-2022-39858 22 Dir. Trav. 2022-10-07 2022-10-07
0.0
None ??? ??? ??? ??? ??? ???
Path traversal vulnerability in AtBroadcastReceiver in FactoryCamera prior to version 3.5.51 allows attackers to write arbitrary file as FactoryCamera privilege.
46 CVE-2022-39838 22 Dir. Trav. File Inclusion 2022-09-05 2022-09-09
0.0
None ??? ??? ??? ??? ??? ???
Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames.
47 CVE-2022-39802 22 Dir. Trav. 2022-10-11 2022-10-28
0.0
None ??? ??? ??? ??? ??? ???
SAP Manufacturing Execution - versions 15.1, 15.2, 15.3, allows an attacker to exploit insufficient validation of a file path request parameter. The intended file path can be manipulated to allow arbitrary traversal of directories on the remote server. The file content within each directory can be read which may lead to information disclosure.
48 CVE-2022-39367 22 Dir. Trav. 2022-10-28 2022-11-01
0.0
None ??? ??? ??? ??? ??? ???
QTIWorks is a software suite for standards-based assessment delivery. Prior to version 1.0-beta15, the QTIWorks Engine allows users to upload QTI content packages as ZIP files. The ZIP handling code does not sufficiently check the paths of files contained within ZIP files, so can insert files into other locations in the filesystem if they are writable by the process running the QTIWorks Engine. In extreme cases, this could allow anonymous users to change files in arbitrary locations in the filesystem. In normal QTIWorks Engine deployments, the impact is somewhat reduced because the default QTIWorks configuration does not enable the public demo functionality, so ZIP files can only be uploaded by users with "instructor" privileges. This vulnerability is fixed in version 1.0-beta15. There are no database configuration changes required when upgrading to this version. No known workarounds for this issue exist.
49 CVE-2022-39347 22 Dir. Trav. 2022-11-16 2022-11-29
0.0
None ??? ??? ??? ??? ??? ???
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
50 CVE-2022-39345 22 Dir. Trav. 2022-10-25 2022-10-26
0.0
None ??? ??? ??? ??? ??? ???
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version.
Total number of vulnerabilities : 619   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.