{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-37865","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2025-05-02T18:35:06.895Z","dateReserved":"2022-08-08T00:00:00.000Z","datePublished":"2022-11-07T00:00:00.000Z"},"containers":{"cna":{"title":"Apache Ivy allows creating/overwriting any file on the system","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-07-04T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used pack200 or zip packaging. For artifacts using the \"zip\", \"jar\" or \"war\" packaging Ivy prior to 2.5.1 doesn't verify the target path when extracting the archive. An archive containing absolute paths or paths that try to traverse \"upwards\" using \"..\" sequences can then write files to any location on the local fie system that the user executing Ivy has write access to. Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1."}],"affected":[{"vendor":"Apache Software Foundation","product":"Apache Ivy","versions":[{"version":"2.4.0","status":"affected","lessThan":"unspecified","versionType":"custom"},{"version":"unspecified","lessThanOrEqual":"2.5.0","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://lists.apache.org/thread/gqvvv7qsm2dfjg6xzsw1s2h08tbr0sdy"},{"name":"FEDORA-2023-35f775fd6e","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SBNJLS/"}],"credits":[{"lang":"en","value":"This issue was discovered by Kostya Kortchinsky of the Databricks Security Team."}],"metrics":[{"other":{"type":"unknown","content":{"other":"medium"}}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"allow create/overwrite any file on the syste"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:37:41.641Z"},"title":"CVE Program Container","references":[{"url":"https://lists.apache.org/thread/gqvvv7qsm2dfjg6xzsw1s2h08tbr0sdy","tags":["x_transferred"]},{"name":"FEDORA-2023-35f775fd6e","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SBNJLS/"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.1,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-02T18:34:25.664772Z","id":"CVE-2022-37865","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-02T18:35:06.895Z"}}]}}