vulnerability

Oracle WebLogic: CVE-2021-29425 : Critical Patch Update

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
2021-04-13
Added
2022-02-28
Modified
2024-05-02

Description

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

Solution(s)

oracle-weblogic-jan-2022-cpu-12_1_3_0_0oracle-weblogic-jan-2022-cpu-12_2_1_3_0oracle-weblogic-jan-2022-cpu-12_2_1_4_0oracle-weblogic-jan-2022-cpu-14_1_1_0_0
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.