CVE-2022-4772

Source
https://cve.org/CVERecord?id=CVE-2022-4772
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4772.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-4772
Aliases
Published
2022-12-27T23:15:10.920Z
Modified
2026-04-12T04:19:02.266183Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "2022-07-29"
                }
            ],
            "cpe": "cpe:2.3:a:widoco_project:widoco:*:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / github.com/dgarijo/widoco

Affected ranges

Type
GIT
Repo
https://github.com/dgarijo/widoco
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "source": "REFERENCES"
}

Affected versions

v0.*
v0.0.1
v1.*
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.10
v1.4.11
v1.4.12
v1.4.13
v1.4.14
v1.4.15
v1.4.15_0
v1.4.15_1
v1.4.16
v1.4.17
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.4.7
v1.4.8
v1.4.9

Database specific

vanir_signatures
[
    {
        "target": {
            "file": "src/main/java/widoco/WidocoUtils.java"
        },
        "source": "https://github.com/dgarijo/widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "254647041985913950256297851210570261528",
                "183966347961919779275227049849298458468",
                "176855646957867255875016823364528094726",
                "291321986614199244829712723252934460752"
            ]
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2022-4772-1ccc919d"
    },
    {
        "target": {
            "function": "unZipIt",
            "file": "src/main/java/widoco/WidocoUtils.java"
        },
        "source": "https://github.com/dgarijo/widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92",
        "deprecated": false,
        "digest": {
            "length": 889.0,
            "function_hash": "60739838064991884570140359112204704453"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2022-4772-68646ddb"
    }
]
vanir_signatures_modified
"2026-04-12T04:19:02Z"
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4772.json"