ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. This vulnerability is patched in release 2.3.0.0 of ESAPI. As a workaround, it is possible to write one's own implementation of the Validator interface. However, maintainers do not recommend this.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 22 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-04-25T00:00:00.000Z
Updated: 2025-11-03T19:26:49.494Z
Reserved: 2022-01-19T00:00:00.000Z
Link: CVE-2022-23457
Updated: 2025-11-03T19:26:49.494Z
Status : Modified
Published: 2022-04-25T20:15:41.870
Modified: 2025-11-03T20:15:52.767
Link: CVE-2022-23457
No data.