Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31159— Partial Path Traversal in com.amazonaws:aws-java-sdk-s3

CVSS 7.9 · High EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-31159

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
Source: NVD (National Vulnerability Database)
Vulnerability Description
The AWS SDK for Java enables Java developers to work with Amazon Web Services. A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1 prior to version 1.12.261. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downloadDirectory` method allows the caller to pass a filesystem object in the object key but contained an issue in the validation logic for the key name. A knowledgeable actor could bypass the validation logic by including a UNIX double-dot in the bucket key. Under certain conditions, this could permit them to retrieve a directory from their S3 bucket that is one level up in the filesystem from their working directory. This issue’s scope is limited to directories whose name prefix matches the destinationDirectory. E.g. for destination directory`/tmp/foo`, the actor can cause a download to `/tmp/foo-bar`, but not `/tmp/bar`. If `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory` is used to download an untrusted buckets contents, the contents of that bucket can be written outside of the intended destination directory. Version 1.12.261 contains a patch for this issue. As a workaround, when calling `com.amazonaws.services.s3.transfer.TransferManager::downloadDirectory`, pass a `KeyFilter` that forbids `S3ObjectSummary` objects that `getKey` method return a string containing the substring `..` .
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Amazon AWS SDK for Java 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Amazon AWS SDK for Java是美国亚马逊(Amazon)公司的一款基于Java平台的用于Amazon Web Services(AWS)的软件开发工具包。。 AWS SDK for Java v1 1.12.261之前版本存在路径遍历漏洞,该漏洞源于AWS SDK for Java使Java开发人员能够使用Amazon Web Services。在AWS SDK for Java v1 1.12.261版本之前的AWS S3 TransferManager组件的“downloadDire
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
awsaws-sdk-java <= 1.12.260 -

II. Public POCs for CVE-2022-31159

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/shoucheng3/aws__aws-sdk-java_CVE-2022-31159_1-12-260POC Details
2Nonehttps://github.com/shoucheng3/aws__aws-sdk-java_CVE-2022-31159_1-12-2600POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-31159

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2022-31159

No comments yet


Leave a comment