Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ybWN4LWZnNXcteDhqOc4AAwD8
FusionAuth vulnerable to directory traversal attack
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
Permalink: https://github.com/advisories/GHSA-rmcx-fg5w-x8j9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ybWN4LWZnNXcteDhqOc4AAwD8
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-rmcx-fg5w-x8j9, CVE-2022-45921
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-45921
- https://github.com/FusionAuth/fusionauth-issues/issues/1983
- https://fusionauth.io/docs/v1/tech/release-notes
- https://github.com/advisories/GHSA-rmcx-fg5w-x8j9
Blast Radius: 8.1
Affected Packages
maven:io.fusionauth:fusionauth-java-client
Dependent packages: 0Dependent repositories: 12
Downloads:
Affected Version Ranges: >= 1.37.0, < 1.41.3
Fixed in: 1.41.3
All affected versions: 1.37.0, 1.38.0, 1.39.0, 1.40.1, 1.41.0
All unaffected versions: 1.0.11, 1.1.0, 1.3.0, 1.4.0, 1.5.0, 1.6.0, 1.7.0, 1.7.4, 1.9.0, 1.10.0, 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.14.0, 1.15.2, 1.15.3, 1.15.4, 1.16.0, 1.17.0, 1.18.0, 1.19.0, 1.20.0, 1.20.1, 1.21.0, 1.22.0, 1.22.2, 1.23.0, 1.24.0, 1.25.0, 1.26.0, 1.27.0, 1.27.2, 1.28.0, 1.28.1, 1.29.0, 1.29.1, 1.30.0, 1.30.1, 1.30.2, 1.31.0, 1.32.0, 1.32.1, 1.33.0, 1.34.0, 1.36.0, 1.42.0, 1.43.0, 1.44.0, 1.45.0, 1.46.0, 1.47.0, 1.48.0, 1.49.1, 1.50.0, 1.51.0, 1.52.0, 1.53.0