CVE-2021-29425
ADVISORY - githubSummary
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
EPSS Score: 0.00485 (0.654)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - github
ADVISORY - gitlab
ADVISORY - redhat
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
NIST
CVSS SCORE
4.8mediumGitHub
CVSS SCORE
4.8mediumDebian
CREATED
UPDATED
ADVISORY IDCVE-2021-29425
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Ubuntu
CREATED
UPDATED
ADVISORY IDCVE-2021-29425
EXPLOITABILITY SCORE
2.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
4.8mediumAmazon
CREATED
UPDATED
ADVISORY IDALAS2-2023-2059
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AmediumRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2021-29425
EXPLOITABILITY SCORE
2.2
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
4.8mediumChainguard
CREATED
UPDATED
ADVISORY ID
CGA-2266-xcqq-qpf4
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
intheWild
CREATED
UPDATED
ADVISORY IDCVE-2021-29425
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-