CVE-2022-4244

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-4244
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4244.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-4244
Aliases
Downstream
Published
2023-09-25T20:15:10Z
Modified
2025-09-19T13:29:39.972439Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.

References

Affected packages

Git / github.com/codehaus-plexus/plexus-utils

Affected ranges

Type
GIT
Repo
https://github.com/codehaus-plexus/plexus-utils
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

plexus-utils-2.*

plexus-utils-2.0.7
plexus-utils-2.1

plexus-utils-3.*

plexus-utils-3.0
plexus-utils-3.0.1
plexus-utils-3.0.10
plexus-utils-3.0.11
plexus-utils-3.0.12
plexus-utils-3.0.13
plexus-utils-3.0.14
plexus-utils-3.0.15
plexus-utils-3.0.16
plexus-utils-3.0.17
plexus-utils-3.0.18
plexus-utils-3.0.19
plexus-utils-3.0.2
plexus-utils-3.0.20
plexus-utils-3.0.21
plexus-utils-3.0.22
plexus-utils-3.0.23
plexus-utils-3.0.3
plexus-utils-3.0.4
plexus-utils-3.0.5
plexus-utils-3.0.6
plexus-utils-3.0.7
plexus-utils-3.0.8
plexus-utils-3.0.9