In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Commons Io
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
Active Iq Unified Manager
Subscribe
|
|
Oracle
Subscribe
|
Access Manager
Subscribe
Agile Engineering Data Management
Subscribe
Agile Plm
Subscribe
Application Performance Management
Subscribe
Application Testing Suite
Subscribe
Banking Apis
Subscribe
Banking Digital Experience
Subscribe
Banking Enterprise Default Management
Subscribe
Banking Enterprise Default Managment
Subscribe
Banking Party Management
Subscribe
Banking Platform
Subscribe
Blockchain Platform
Subscribe
Commerce Guided Search
Subscribe
Communications Application Session Controller
Subscribe
Communications Billing And Revenue Management Elastic Charging Engine
Subscribe
Communications Cloud Native Core Network Repository Function
Subscribe
Communications Cloud Native Core Policy
Subscribe
Communications Cloud Native Core Unified Data Repository
Subscribe
Communications Contacts Server
Subscribe
Communications Converged Application Server - Service Controller
Subscribe
Communications Convergence
Subscribe
Communications Design Studio
Subscribe
Communications Diameter Intelligence Hub
Subscribe
Communications Interactive Session Recorder
Subscribe
Communications Offline Mediation Controller
Subscribe
Communications Order And Service Management
Subscribe
Communications Policy Management
Subscribe
Communications Pricing Design Center
Subscribe
Communications Service Broker
Subscribe
Enterprise Communications Broker
Subscribe
Enterprise Session Border Controller
Subscribe
Financial Services Analytical Applications Infrastructure
Subscribe
Financial Services Model Management And Governance
Subscribe
Flexcube Core Banking
Subscribe
Fusion Middleware Mapviewer
Subscribe
Health Sciences Data Management Workbench
Subscribe
Health Sciences Information Manager
Subscribe
Healthcare Data Repository
Subscribe
Helidon
Subscribe
Insurance Policy Administration
Subscribe
Insurance Rules Palette
Subscribe
Oss Support Tools
Subscribe
Primavera Unifier
Subscribe
Real User Experience Insight
Subscribe
Rest Data Services
Subscribe
Retail Assortment Planning
Subscribe
Retail Integration Bus
Subscribe
Retail Merchandising System
Subscribe
Retail Order Broker
Subscribe
Retail Pricing
Subscribe
Retail Service Backbone
Subscribe
Retail Size Profile Optimization
Subscribe
Retail Xstore Point Of Service
Subscribe
Solaris Cluster
Subscribe
Utilities Testing Accelerator
Subscribe
Webcenter Portal
Subscribe
Weblogic Server
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2741-1 | commons-io security update |
EUVD |
EUVD-2021-0828 | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. |
Github GHSA |
GHSA-gwrp-pvrq-jmwv | Path Traversal and Improper Input Validation in Apache Commons IO |
Ubuntu USN |
USN-5095-1 | Apache Commons IO vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
Neither the method in question (FileNameUtils.normalize) nor any methods, that invoke it, do actually access any files. There's only a string returned, from which a path can be constructed. In other words, a possible workaround would be not passing any unsafe input to FileNameUtils.normalize.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T22:02:51.887Z
Reserved: 2021-03-30T00:00:00
Link: CVE-2021-29425
No data.
Status : Modified
Published: 2021-04-13T07:15:12.327
Modified: 2024-11-21T06:01:04.113
Link: CVE-2021-29425
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN