Path Traversal and Improper Input Validation in Apache Commons IO
Moderate severity
GitHub Reviewed
Published
Apr 26, 2021
to the GitHub Advisory Database
•
Updated Feb 14, 2024
Description
Published by the National Vulnerability Database
Apr 13, 2021
Reviewed
Apr 26, 2021
Published to the GitHub Advisory Database
Apr 26, 2021
Last updated
Feb 14, 2024
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
References