Description
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
Remediation
References
https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E
https://seclists.org/oss-sec/2020/q2/112
Related Vulnerabilities
CVE-2020-36189 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2023-26109 Vulnerability in npm package node-bluetooth-serial-port
CVE-2020-2172 Vulnerability in maven package org.jenkins-ci.plugins:code-coverage-api
CVE-2022-33891 Vulnerability in maven package org.apache.spark:spark-core_2.12
CVE-2022-24785 Vulnerability in maven package org.fujion.webjars:moment