Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2022-37865: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2022-37865: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/07/2022
Created
03/22/2023
Added
03/20/2023
Modified
03/20/2023

Description

With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used pack200 or zip packaging. For artifacts using the "zip", "jar" or "war" packaging Ivy prior to 2.5.1 doesn't verify the target path when extracting the archive. An archive containing absolute paths or paths that try to traverse "upwards" using ".." sequences can then write files to any location on the local fie system that the user executing Ivy has write access to. Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1.

Solution(s)

  • suse-upgrade-apache-ivy
  • suse-upgrade-apache-ivy-javadoc
  • suse-upgrade-ivy-local
  • suse-upgrade-javapackages-ivy
  • suse-upgrade-xmvn-connector-ivy
  • suse-upgrade-xmvn-connector-ivy-javadoc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;