CVE-2022-4773

LOW

Cloudsync < 2022-09-21 - Path Traversal

Title source: rule
STIX 2.1

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References (3)

Core 3
Core References
Permissions Required, Third Party Advisory vdb-entry technical-description
https://vuldb.com/?id.216919
Permissions Required, Third Party Advisory signature permissions-required
https://vuldb.com/?ctiid.216919

Scores

CVSS v3 2.5
EPSS 0.0014
EPSS Percentile 33.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Details

CWE
CWE-22
Status published
Products (1)
cloudsync_project/cloudsync < 2022-09-21
Published Dec 28, 2022
Tracked Since Feb 18, 2026