7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.3 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
52.9%
Issue Overview:
When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied โpatternโ that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain โโฆ/โ sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivyโs local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing โโฆโ sequences and a โnormalโ repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1. (CVE-2022-37866)
Affected Packages:
apache-ivy
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update apache-ivy to update your system.
New Packages:
noarch:
ย ย ย apache-ivy-2.3.0-4.amzn2.0.1.noarch
ย ย ย apache-ivy-javadoc-2.3.0-4.amzn2.0.1.noarch
src:
ย ย ย apache-ivy-2.3.0-4.amzn2.0.1.src
Red Hat: CVE-2022-37866
Mitre: CVE-2022-37866
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | noarch | apache-ivy | <ย 2.3.0-4.amzn2.0.1 | apache-ivy-2.3.0-4.amzn2.0.1.noarch.rpm |
Amazon Linux | 2 | noarch | apache-ivy-javadoc | <ย 2.3.0-4.amzn2.0.1 | apache-ivy-javadoc-2.3.0-4.amzn2.0.1.noarch.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
8.3 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
52.9%