๐Ÿ” CVE Alert

CVE-2022-4244

HIGH 7.5

Codehaus-plexus: directory traversal

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.

CWE CWE-22
Vendor red hat
Product rhint camel-k-1.10.1
Published Sep 25, 2023
Last Updated Aug 3, 2024
Stay Ahead of the Next One

Get instant alerts for red hat rhint camel-k-1.10.1

Be the first to know when new high vulnerabilities affecting red hat rhint camel-k-1.10.1 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

Red Hat / RHINT Camel-K-1.10.1
All versions affected
Red Hat / RHPAM 7.13.1 async
All versions affected
Red Hat / A-MQ Clients 2
All versions affected
Red Hat / Red Hat A-MQ Online
All versions affected
Red Hat / Red Hat build of Apache Camel for Spring Boot
All versions affected
Red Hat / Red Hat build of Quarkus
All versions affected
Red Hat / Red Hat Data Grid 8
All versions affected
Red Hat / Red Hat Decision Manager 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Integration Camel Quarkus
All versions affected
Red Hat / Red Hat Integration Change Data Capture
All versions affected
Red Hat / Red Hat Integration Service Registry
All versions affected
Red Hat / Red Hat JBoss A-MQ 7
All versions affected
Red Hat / Red Hat JBoss Data Grid 7
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 6
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform 7
All versions affected
Red Hat / Red Hat JBoss Enterprise Application Platform Expansion Pack
All versions affected
Red Hat / Red Hat JBoss Fuse 6
All versions affected
Red Hat / Red Hat JBoss Fuse 7
All versions affected
Red Hat / Red Hat JBoss Fuse Service Works 6
All versions affected
Red Hat / Red Hat JBoss Web Server 3
All versions affected
Red Hat / Red Hat JBoss Web Server 5
All versions affected
Red Hat / Red Hat OpenShift Application Runtimes
All versions affected
Red Hat / Red Hat Process Automation 7
All versions affected
Red Hat / Red Hat Single Sign-On 7
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat Software Collections
All versions affected
Red Hat / Red Hat support for Spring Boot
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2023:2135 access.redhat.com: https://access.redhat.com/errata/RHSA-2023:3906 access.redhat.com: https://access.redhat.com/security/cve/CVE-2022-4244 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2149841