Vulnerability Details CVE-2022-23457
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.2%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.5
Products affected by CVE-2022-23457
-
cpe:2.3:a:netapp:active_iq_unified_manager:-
-
cpe:2.3:a:netapp:oncommand_workflow_automation:-
-
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0
-
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0
-
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0
-
cpe:2.3:a:owasp:enterprise_security_api:-
-
cpe:2.3:a:owasp:enterprise_security_api:2.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.0.1
-
cpe:2.3:a:owasp:enterprise_security_api:2.1.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.1.0.1
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.0.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.1.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.1.1
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.2.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.3.0
-
cpe:2.3:a:owasp:enterprise_security_api:2.2.3.1