CVE-2024-24042: Path traversal in flaskcode Devan-Kerman ARRP
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84376%
CWE
Published
3/19/2024
Updated
3/29/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| net.devtech:arrp | maven | <= 0.8.1 | 0.8.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path normalization in two methods handling file operations. The original code used Path.startsWith() without resolving absolute paths, making it vulnerable to directory traversal via relative paths (e.g., '../../malicious.file'). The patch explicitly uses toAbsolutePath() in both methods to ensure proper containment checks. These functions are directly referenced in the CVE description and commit diff, with the vulnerability manifesting when attacker-controlled data flows through them during dump operations.