CVE-2022-4773
LOW
2,5
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
Description
AI Translation Available
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0014
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
StableCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Modify Files Or Directories
Read Files Or Directories
Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies:
AI/ML
Application
Cloudsync by Cloudsync Project
Version Range Affected
To
2022-09-21
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cloudsync_project:cloudsync:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade6851…
https://vuldb.com/?ctiid.216919
https://vuldb.com/?id.216919
https://github.com/HolgerHees/cloudsync/commit/3ad796833398af257c28e0ebeade6851…
https://vuldb.com/?ctiid.216919
https://vuldb.com/?id.216919