Description
Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326
Remediation
References
https://karaf.apache.org/security/cve-2022-22932.txt
Related Vulnerabilities
CVE-2020-36732 Vulnerability in maven package org.webjars.bowergithub.brix:crypto-js
CVE-2013-1921 Vulnerability in maven package org.picketbox:jbosssx-bare
CVE-2018-1000153 Vulnerability in maven package org.jenkins-ci.plugins:vsphere-cloud
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on
CVE-2011-1411 Vulnerability in maven package org.opensaml:opensaml