{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4880","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-07T12:55:32.672Z","datePublished":"2023-01-07T12:55:54.952Z","dateUpdated":"2024-08-03T01:55:45.863Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T14:22:14.746Z"},"title":"stakira OpenUtau ZIP Archive VoicebankInstaller.cs VoicebankInstaller path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Path Traversal"}]}],"affected":[{"vendor":"stakira","product":"OpenUtau","versions":[{"version":"n/a","status":"affected"}],"modules":["ZIP Archive Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in stakira OpenUtau. It has been classified as critical. This affects the function VoicebankInstaller of the file OpenUtau.Core/Classic/VoicebankInstaller.cs of the component ZIP Archive Handler. The manipulation leads to path traversal. Upgrading to version 0.0.991 is able to address this issue. The identifier of the patch is 849a0a6912aac8b1c28cc32aa1132a3140caff4a. It is recommended to upgrade the affected component. The identifier VDB-217617 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in stakira OpenUtau ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion VoicebankInstaller der Datei OpenUtau.Core/Classic/VoicebankInstaller.cs der Komponente ZIP Archive Handler. Durch Manipulation mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 0.0.991 vermag dieses Problem zu lösen. Der Patch wird als 849a0a6912aac8b1c28cc32aa1132a3140caff4a bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-29T22:01:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217617","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217617","tags":["signature","permissions-required"]},{"url":"https://github.com/stakira/OpenUtau/pull/544","tags":["issue-tracking"]},{"url":"https://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4a","tags":["patch"]},{"url":"https://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:55:45.863Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217617","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217617","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/stakira/OpenUtau/pull/544","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4a","tags":["patch","x_transferred"]},{"url":"https://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991","tags":["patch","x_transferred"]}]}]}}