A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "2022-07-29"
}
],
"cpe": "cpe:2.3:a:widoco_project:widoco:*:*:*:*:*:*:*:*"
}
]
}[
{
"target": {
"file": "src/main/java/widoco/WidocoUtils.java"
},
"source": "https://github.com/dgarijo/widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"254647041985913950256297851210570261528",
"183966347961919779275227049849298458468",
"176855646957867255875016823364528094726",
"291321986614199244829712723252934460752"
]
},
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2022-4772-1ccc919d"
},
{
"target": {
"function": "unZipIt",
"file": "src/main/java/widoco/WidocoUtils.java"
},
"source": "https://github.com/dgarijo/widoco/commit/f2279b76827f32190adfa9bd5229b7d5a147fa92",
"deprecated": false,
"digest": {
"length": 889.0,
"function_hash": "60739838064991884570140359112204704453"
},
"signature_type": "Function",
"signature_version": "v1",
"id": "CVE-2022-4772-68646ddb"
}
]
"2026-04-12T04:19:02Z"
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4772.json"