CVE-2022-4572

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-4572
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4572.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-4572
Aliases
Published
2022-12-17T02:15:07Z
Modified
2025-01-08T14:28:01.543762Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireaderextractfiles of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 is able to address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability.

References

Affected packages

Git / github.com/jrspruitt/ubi_reader

Affected ranges

Type
GIT
Repo
https://github.com/jrspruitt/ubi_reader
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Type
GIT
Repo
https://github.com/onekey-sec/ubi_reader
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.5.0-master
v0.6.2-master
v0.6.2-testing
v0.6.3-master
v0.7.1-master
v0.7.2-master
v0.8.0-master

Other

v1_ui
v2_ui