Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ybWN4LWZnNXcteDhqOc4AAwD8

FusionAuth vulnerable to directory traversal attack

FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.

Permalink: https://github.com/advisories/GHSA-rmcx-fg5w-x8j9
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ybWN4LWZnNXcteDhqOc4AAwD8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-rmcx-fg5w-x8j9, CVE-2022-45921
References: Repository: https://github.com/FusionAuth/fusionauth-issues
Blast Radius: 8.1

Affected Packages

maven:io.fusionauth:fusionauth-java-client
Dependent packages: 0
Dependent repositories: 12
Downloads:
Affected Version Ranges: >= 1.37.0, < 1.41.3
Fixed in: 1.41.3
All affected versions: 1.37.0, 1.38.0, 1.39.0, 1.40.1, 1.41.0
All unaffected versions: 1.0.11, 1.1.0, 1.3.0, 1.4.0, 1.5.0, 1.6.0, 1.7.0, 1.7.4, 1.9.0, 1.10.0, 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.14.0, 1.15.2, 1.15.3, 1.15.4, 1.16.0, 1.17.0, 1.18.0, 1.19.0, 1.20.0, 1.20.1, 1.21.0, 1.22.0, 1.22.2, 1.23.0, 1.24.0, 1.25.0, 1.26.0, 1.27.0, 1.27.2, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.30.2, 1.31.0, 1.32.0, 1.32.1, 1.33.0, 1.34.0, 1.36.0, 1.42.0, 1.43.0, 1.44.0, 1.45.0, 1.46.0, 1.47.0, 1.48.0, 1.49.1, 1.50.0, 1.51.0, 1.52.0, 1.53.0