
We found results for “”
CVE-2022-36007
Good to know:


Date: August 13, 2022
Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions "load-file" and "load-resource". These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: "[ "/Users/foo/resources" ]" When passing relative paths to these two vulnerable functions everything is fine: "(load-resource "test.png")" => loads the file "/Users/foo/resources/test.png" "(load-resource "../resources-alt/test.png")" => rejected, outside the load path When passing absolute paths to these two vulnerable functions Venice may return files outside the configured load paths: "(load-resource "/Users/foo/resources/test.png")" => loads the file "/Users/foo/resources/test.png" "(load-resource "/Users/foo/resources-alt/test.png")" => loads the file "/Users/foo/resources-alt/test.png" !!! The latter call suffers from the Partial Path Traversal vulnerability. This issue’s scope is limited to absolute paths whose name prefix matches a load path. E.g. for a load-path ""/Users/foo/resources"", the actor can cause loading a resource also from ""/Users/foo/resources-alt"", but not from ""/Users/foo/images"". Versions of Venice before and including v1.10.17 are affected by this issue. Upgrade to Venice >= 1.10.18, if you are on a version < 1.10.18. There are currently no known workarounds.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-22Top Fix

CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | HIGH |
Availability (A): | NONE |