A vulnerability was found in drogatkin TJWS2. It has been declared as critical. Affected by this vulnerability is the function deployWar of the file 1.x/src/rogatkin/web/WarRoller.java. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 1bac15c496ec54efe21ad7fab4e17633778582fc. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216187.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4594.json"
[
{
"source": "https://github.com/drogatkin/tjws2/commit/1bac15c496ec54efe21ad7fab4e17633778582fc",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "1.x/src/rogatkin/web/WarRoller.java"
},
"id": "CVE-2022-4594-aad00b84",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"328061665776794597130301823361199294319",
"213781147036017673915624787530271011145",
"177796164839171755714222910602738477686",
"81908112164739590840909524155259851099"
]
}
},
{
"source": "https://github.com/drogatkin/tjws2/commit/1bac15c496ec54efe21ad7fab4e17633778582fc",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "deployWar",
"file": "1.x/src/rogatkin/web/WarRoller.java"
},
"id": "CVE-2022-4594-bb0a9505",
"signature_type": "Function",
"digest": {
"function_hash": "12433790911899577352291919858434873753",
"length": 2123.0
}
}
]