OroPlatform vulnerable to path traversal during temporary file manipulations
Package
Affected versions
>= 4.1.0, <= 4.1.13
>= 4.2.0, <= 4.2.10
>= 5.0.0, < 5.0.8
Patched versions
5.0.8
Description
Published by the National Vulnerability Database
Nov 27, 2023
Published to the GitHub Advisory Database
Nov 27, 2023
Reviewed
Nov 27, 2023
Last updated
Nov 27, 2023
Impact
Path Traversal is possible in
Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName
.With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution. The file will be deleted immediately after the script ends.
Workarounds
Apply patch
Or decorate
Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName
in your customization and clear$suggestedFileName
argumentReferences
References