Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4244— Codehaus-plexus: directory traversal

CVSS 7.5 · High EPSS 0.27% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-4244

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Codehaus-plexus: directory traversal
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
codehaus-plexus 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
codehaus-plexus是codehaus-plexus开源的一种各种实用程序类的集合。可轻松处理字符串、文件、命令行、XML等。 codehaus-plexus 存在路径遍历漏洞,该漏洞源于目录遍历。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRHINT Camel-K-1.10.1-cpe:/a:redhat:camel_k:1
Red HatRHPAM 7.13.1 async-cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13
Red HatA-MQ Clients 2-cpe:/a:redhat:a_mq_clients:2
Red HatRed Hat A-MQ Online-cpe:/a:redhat:amq_online:1
Red HatRed Hat build of Apache Camel for Spring Boot-cpe:/a:redhat:camel_spring_boot:3
Red HatRed Hat build of Quarkus-cpe:/a:redhat:quarkus:2
Red HatRed Hat Data Grid 8-cpe:/a:redhat:jboss_data_grid:8
Red HatRed Hat Decision Manager 7-cpe:/a:redhat:jboss_enterprise_brms_platform:7
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat Integration Camel Quarkus-cpe:/a:redhat:camel_quarkus:2
Red HatRed Hat Integration Change Data Capture-cpe:/a:redhat:integration:1
Red HatRed Hat Integration Service Registry-cpe:/a:redhat:service_registry:2
Red HatRed Hat JBoss A-MQ 7-cpe:/a:redhat:amq_broker:7
Red HatRed Hat JBoss Data Grid 7-cpe:/a:redhat:jboss_data_grid:7
Red HatRed Hat JBoss Enterprise Application Platform 6-cpe:/a:redhat:jboss_enterprise_application_platform:6
Red HatRed Hat JBoss Enterprise Application Platform 7-cpe:/a:redhat:jboss_enterprise_application_platform:7
Red HatRed Hat JBoss Enterprise Application Platform Expansion Pack-cpe:/a:redhat:jbosseapxp
Red HatRed Hat JBoss Fuse 6-cpe:/a:redhat:jboss_fuse:6
Red HatRed Hat JBoss Fuse 7-cpe:/a:redhat:jboss_fuse:7
Red HatRed Hat JBoss Fuse Service Works 6-cpe:/a:redhat:jboss_fuse_service_works:6
Red HatRed Hat JBoss Web Server 3-cpe:/a:redhat:jboss_enterprise_web_server:3
Red HatRed Hat JBoss Web Server 5-cpe:/a:redhat:jboss_enterprise_web_server:5
Red HatRed Hat OpenShift Application Runtimes-cpe:/a:redhat:openshift_application_runtimes:1.0
Red HatRed Hat Process Automation 7-cpe:/a:redhat:jboss_enterprise_bpms_platform:7
Red HatRed Hat Single Sign-On 7-cpe:/a:redhat:red_hat_single_sign_on:7
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat Software Collections-cpe:/a:redhat:rhel_software_collections:3
Red HatRed Hat support for Spring Boot-cpe:/a:redhat:openshift_application_runtimes:1.0

II. Public POCs for CVE-2022-4244

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/shoucheng3/codehaus-plexus__plexus-utils_CVE-2022-4244_3-0-23POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-4244

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2023-09-25 · 6 CVEs total

CVE-2022-41378.1 HIGHKeycloak: reflected xss attack
CVE-2022-43187.8 HIGHCri-o: /etc/passwd tampering privesc
CVE-2023-51567.5 HIGHGlibc: dos due to memory leak in getaddrinfo.c
CVE-2023-427537.0 HIGHKernel: netfilter: potential slab-out-of-bound access due to integer underflow
CVE-2022-42454.3 MEDIUMCodehaus-plexus: xml external entity (xxe) injection

IV. Related Vulnerabilities

V. Comments for CVE-2022-4244

Anonymous User
2025-08-25 09:40:13

katana


Leave a comment