Description
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
Remediation
References
https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E
https://seclists.org/oss-sec/2020/q2/112
Related Vulnerabilities
CVE-2022-37266 Vulnerability in npm package steal
CVE-2021-4264 Vulnerability in npm package dustjs-linkedin
CVE-2020-11022 Vulnerability in maven package org.fujion.webjars:jquery
CVE-2019-16563 Vulnerability in maven package tech.andrey.jenkins:mission-control-view
CVE-2023-39155 Vulnerability in maven package org.jenkins-ci.plugins:chef-identity