Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2022-11-23T20:15Z
Modified Date2022-11-28T19:40Z
CWE TypeCWE-22
Descriptionqpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/EvgeniyPatlan/qpress/commit/ddb312090ebd5794e81bc6fb1dfb4e79eda48761
Reference DescriptionMISC https://github.com/EvgeniyPatlan/qpress/commit/ddb312090ebd5794e81bc6fb1dfb4e79eda48761
Reference URLhttps://pkgs.org/download/qpress
Reference DescriptionMISC https://pkgs.org/download/qpress
Reference URLhttps://github.com/PierreLvx/qpress/compare/20170415...20220819
Reference DescriptionMISC https://github.com/PierreLvx/qpress/compare/20170415...20220819
Reference URLhttps://github.com/PierreLvx/qpress/pull/6
Reference DescriptionMISC https://github.com/PierreLvx/qpress/pull/6
Reference URLhttps://github.com/percona/percona-xtrabackup/pull/1366
Reference DescriptionMISC https://github.com/percona/percona-xtrabackup/pull/1366
TagsPatch Third Party Advisory

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles