View all vulnerabilities

CVE-2021-29425

Path Traversal and Improper Input Validation in Apache Commons IO

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
4.7
Score Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Versions
commons-io:commons-io < 2.7; com.cosium.vet:vet >= 1.0; com.virjar:ratel-api >= 1.0.0; net.hasor:cobble-lang >= 4.4.1; org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-io >= 1.4; org.checkerframework.annotatedlib:commons-io >= 2.6 < 2.7; org.smartboot.servlet:servlet-core >= 0.1.9
Severity
Medium
Ecosystem
Publish Date
April 26, 2021
Modified Date
March 12, 2024