OESA-2025-1356

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1356
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1356.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-1356
Upstream
Published
2025-04-03T12:53:39Z
Modified
2025-09-03T06:31:23.227155Z
Summary
apache-commons-vfs security update
Details

Commons VFS provides a uniform view of files through a single API which is designed for accessing various different file systems. These file systems could be a local disk, an HTTP server or a ZIP archive file. The key features are listed as follows: * The API is consistent among various file types. * Support for a wide range of file systems. * Support caching local file system with different fs types. * Event delivery. * Provides in-JVM info caching. * A set of Ant tasks which VFS is enabled. * Easy to be intergrated into applications such as VFS-aware ClassLoader and URLStreamHandlerFactory.

Security Fix(es):

Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0.

The FileObject API in Commons VFS has a 'resolveFile' method that takes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that "an exception is thrown if the resolved file is not a descendent of the base file". However, when the path contains encoded ".." characters (for example, "%2E%2E/bar.txt"), it might return file objects that are not a descendent of the base file, without throwing an exception. This issue affects Apache Commons VFS: before 2.10.0.

Users are recommended to upgrade to version 2.10.0, which fixes the issue.(CVE-2025-27553)

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Commons VFS.

The FtpFileObject class can throw an exception when a file is not found, revealing the original URI in its message, which may include a password. The fix is to mask the password in the exception message This issue affects Apache Commons VFS: before 2.10.0.

Users are recommended to upgrade to version 2.10.0, which fixes the issue.(CVE-2025-30474)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / apache-commons-vfs

Package

Name
apache-commons-vfs
Purl
pkg:rpm/openEuler/apache-commons-vfs&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.0-1.oe2403sp1

Ecosystem specific

{
    "src": [
        "apache-commons-vfs-2.10.0-1.oe2403sp1.src.rpm"
    ],
    "noarch": [
        "apache-commons-vfs-2.10.0-1.oe2403sp1.noarch.rpm",
        "apache-commons-vfs-devel-2.10.0-1.oe2403sp1.noarch.rpm",
        "apache-commons-vfs-help-2.10.0-1.oe2403sp1.noarch.rpm"
    ]
}