Miggo Logo

CVE-2020-35460: MPXJ path Traversal vulnerability

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.68929%
Published
12/18/2020
Updated
1/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.sf.mpxj:mpxjmaven< 8.3.58.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability was explicitly patched in commit 8eaf422 by adding canonical path validation in processZipStream. The CVE description directly references this ZIP stream handler flow, and the pre-patch code created files using ZipEntry.getName() without sanitization. The added checks (canonicalDestinationFile.startsWith) confirm this was the vulnerable point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ommon/InputStr**m**lp*r.j*v* in P**kwoo* MPXJ ***or* *.*.* *llows *ir**tory tr*v*rs*l in t** zip str**m **n*l*r *low, l***in* to t** writin* o* *il*s to *r*itr*ry lo**tions.

Reasoning

T** vuln*r**ility w*s *xpli*itly p*t**** in *ommit ******* *y ***in* **noni**l p*t* v*li**tion in `pro**ssZipStr**m`. T** *V* **s*ription *ir**tly r***r*n**s t*is ZIP str**m **n*l*r *low, *n* t** pr*-p*t** *o** *r**t** *il*s usin* `Zip*ntry.**tN*m*()