CVE-2022-22932

Source
https://cve.org/CVERecord?id=CVE-2022-22932
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-22932.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-22932
Aliases
Published
2022-01-26T11:15:09.583Z
Modified
2026-02-13T02:33:12.578461Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326

References

Affected packages

Git / github.com/apache/karaf

Affected ranges

Type
GIT
Repo
https://github.com/apache/karaf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed

Affected versions

karaf-4.*
karaf-4.3.0
karaf-4.3.1
karaf-4.3.2
karaf-4.3.3
karaf-4.3.4
karaf-4.3.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-22932.json"