{"id":"CVE-2022-4878","summary":"JATOS ZIP ZipUtil.java ZipUtil path traversal","details":"A vulnerability classified as critical has been found in JATOS. Affected is the function ZipUtil of the file modules/common/app/utils/common/ZipUtil.java of the component ZIP Handler. The manipulation leads to path traversal. Upgrading to version 3.7.5-alpha is able to address this issue. The name of the patch is 2b42519f309d8164e8811392770ce604cdabb5da. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217548.","modified":"2026-05-10T11:50:08.716724Z","published":"2023-01-06T09:30:21.960Z","database_specific":{"cna_assigner":"VulDB","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/4xxx/CVE-2022-4878.json","cwe_ids":["CWE-22"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/4xxx/CVE-2022-4878.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4878"},{"type":"ADVISORY","url":"https://vuldb.com/?id.217548"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.217548"},{"type":"FIX","url":"https://github.com/JATOS/JATOS/commit/2b42519f309d8164e8811392770ce604cdabb5da"},{"type":"FIX","url":"https://github.com/JATOS/JATOS/releases/tag/v3.7.5-alpha"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jatos/jatos","events":[{"introduced":"0"},{"last_affected":"9dcbb6e2bfaa7657d061f35f05d13a115fffd18d"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"3.7.5"}],"cpe":"cpe:2.3:a:jatos:jatos:*:*:*:*:*:*:*:*"}}],"versions":["g3.5.4","v1.0alpha","v1.1.1-alpha","v1.1.10-beta","v1.1.11-beta","v1.1.2-alpha","v1.1.3-beta","v1.1.4-beta","v1.1.5-beta","v1.1.6-beta","v1.1.7-beta","v1.1.8-beta","v1.1.9-beta","v1.1alpha","v2.1.1-alpha","v2.1.10-beta","v2.1.11-beta","v2.1.12-beta","v2.1.2-alpha","v2.1.3-alpha","v2.1.4-alpha","v2.1.5-beta","v2.1.6-beta","v2.1.7-beta","v2.1.8-beta","v2.1.9-beta","v2.2.1-beta","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v3.1.1-beta","v3.1.10","v3.1.11","v3.1.12","v3.1.2-beta","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.1.8","v3.1.9","v3.2.1","v3.2.2","v3.2.3","v3.3.1","v3.3.2","v3.3.3","v3.4.1","v3.4.2","v3.5.1","v3.5.2","v3.5.3","v3.5.4","v3.5.5","v3.5.6-alpha","v3.7.1","v3.7.1-alpha","v3.7.2","v3.7.3","v3.7.4","v3.7.4-alpha","v3.7.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-4878.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}