2 results (0.006 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Square Retrofit version versions from (including) 2.0 and 2.5.0 (excluding) contains a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter that can result in By manipulating the URL an attacker could add or delete resources otherwise unavailable to her.. This attack appear to be exploitable via An attacker should have access to an encoded path parameter on POST, PUT or DELETE request.. This vulnerability appears to have been fixed in 2.5.0 and later. Square Retrofit, desde la versión 2.0 (incluida) y 2.5.0 (excluida), contiene una vulnerabilidad de salto de directorio en la clase RequestBuilder, método addPathParameter. Al manipular la URL, un atacante podría añadir o eliminar recursos que no estarían disponibles. • https://access.redhat.com/errata/RHSA-2019:3892 https://github.com/square/retrofit/blob/master/CHANGELOG.md https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982 https://ihacktoprotect.com/post/retrofit-path-traversal https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thre • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Square Open Source Retrofit version Prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contains a XML External Entity (XXE) vulnerability in JAXB that can result in An attacker could use this to remotely read files from the file system or to perform SSRF.. This vulnerability appears to have been fixed in After commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. Square Open Source Retrofit, en versiones anteriores al commit con ID 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437, contiene una vulnerabilidad XEE (XML External Entity) en JAXB que puede resultar en que un atacante podría aprovecharla para leer archivos de forma remota desde el sistema de archivos o para realizar Server-Side Request Forgery (SSRF). La vulnerabilidad parece haber sido solucionada tras el commit con ID 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. • https://github.com/square/retrofit/pull/2735 • CWE-611: Improper Restriction of XML External Entity Reference •