CVE-2022-41951

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41951
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41951.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-41951
Aliases
Published
2023-11-27T20:27:33Z
Modified
2025-10-22T18:35:24.600841Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
OroPlatform vulnerable to path traversal during temporary file manipulations
Details

OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName. With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution. This vulnerability has been fixed in version 5.0.9.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/oroinc/platform

Affected ranges

Type
GIT
Repo
https://github.com/oroinc/platform
Events
Type
GIT
Repo
https://github.com/oroinc/platform
Events
Type
GIT
Repo
https://github.com/oroinc/platform
Events

Affected versions

4.*

4.1.0
4.1.1
4.1.1-rc
4.1.1-rc2
4.1.10
4.1.11
4.1.12
4.1.13
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
4.1.7
4.1.8
4.1.9
4.2.0
4.2.1
4.2.10
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.2.8
4.2.9

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8