{"containers":{"cna":{"affected":[{"product":"HUAWEI Mate 20;HUAWEI Mate 20 Pro;Hima-L29C;Laya-AL00EP;OxfordS-AN00A;Tony-AL00B","vendor":"n/a","versions":[{"status":"affected","version":"9.0.0.195(C01E195R2P1),9.1.0.139(C00E133R3P1)"},{"status":"affected","version":"9.0.0.187(C432E10R1P16),9.0.0.188(C185E10R2P1),9.0.0.245(C10E10R2P1),9.0.0.266(C432E10R1P16),9.0.0.267(C636E10R2P1),9.0.0.268(C635E12R1P16),9.0.0.278(C185E10R2P1)"},{"status":"affected","version":"9.0.0.105(C10E9R1P16),9.0.0.105(C185E9R1P16),9.0.0.105(C636E9R1P16)"},{"status":"affected","version":"9.1.0.139(C786E133R3P1)"},{"status":"affected","version":"10.1.0.223(C00E210R5P1)"},{"status":"affected","version":"9.1.0.257(C00E222R2P1)"}]}],"descriptions":[{"lang":"en","value":"There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1)."}],"problemTypes":[{"descriptions":[{"description":"Path Traversal","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-07-13T11:42:33.000Z","orgId":"25ac1063-e409-4190-8079-24548c77ea2e","shortName":"huawei"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@huawei.com","ID":"CVE-2021-22440","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HUAWEI Mate 20;HUAWEI Mate 20 Pro;Hima-L29C;Laya-AL00EP;OxfordS-AN00A;Tony-AL00B","version":{"version_data":[{"version_value":"9.0.0.195(C01E195R2P1),9.1.0.139(C00E133R3P1)"},{"version_value":"9.0.0.187(C432E10R1P16),9.0.0.188(C185E10R2P1),9.0.0.245(C10E10R2P1),9.0.0.266(C432E10R1P16),9.0.0.267(C636E10R2P1),9.0.0.268(C635E12R1P16),9.0.0.278(C185E10R2P1)"},{"version_value":"9.0.0.105(C10E9R1P16),9.0.0.105(C185E9R1P16),9.0.0.105(C636E9R1P16)"},{"version_value":"9.1.0.139(C786E133R3P1)"},{"version_value":"10.1.0.223(C00E210R5P1)"},{"version_value":"9.1.0.257(C00E222R2P1)"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Path Traversal"}]}]},"references":{"reference_data":[{"name":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en","refsource":"MISC","url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T18:44:13.921Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210630-01-pathtraversal-en"}]}]},"cveMetadata":{"assignerOrgId":"25ac1063-e409-4190-8079-24548c77ea2e","assignerShortName":"huawei","cveId":"CVE-2021-22440","datePublished":"2021-07-13T11:42:33.000Z","dateReserved":"2021-01-05T00:00:00.000Z","dateUpdated":"2024-08-03T18:44:13.921Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}