Miggo Logo

GHSA-82j3-hf72-7x93: Reposilite vulnerable to path traversal while serving javadoc expanded files (arbitrary file read) (`GHSL-2024-074`)

8.2

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
11/4/2024
Updated
11/4/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.reposilite:reposilite-backendmaven>= 3.3.0, < 3.5.123.5.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path sanitization in the Javadoc raw resource handler. The key evidence is in JavadocFacade.kt line 77 where resource.toString() is used to construct a filesystem path. This allows attackers to inject path traversal sequences. The commit diff shows the fix involved switching to resource.toPath() which uses normalized paths via the Location class. The function directly handles user-controlled input (resource parameter) and combines it with a base directory without adequate validation, meeting CWE-22 criteria.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry R*posilit* v*.*.** is *****t** *y *n *r*itr*ry *il* R*** vuln*r**ility vi* p*t* tr*v*rs*l w*il* s*rvin* *xp*n*** j*v**o* *il*s. ### **t*ils T** pro*l*m li*s in t** w*y *ow t** *xp*n*** j*v**o* *il*s *r* s*rv**. T** `**T /j*v**o*/{r*posit

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* s*nitiz*tion in t** J*v**o* r*w r*sour** **n*l*r. T** k*y *vi**n** is in `J*v**o*******.kt` lin* ** w**r* `r*sour**.toStrin*()` is us** to *onstru*t * *il*syst*m p*t*. T*is *llows *tt**k*rs to inj**t p*t* tr