Description
util/FileDownloadUtils.java in FileDownloader 1.7.3 does not check an attachment's name. If an attacker places "../" in the file name, the file can be stored in an unintended directory because of Directory Traversal.
Remediation
References
https://github.com/lingochamp/FileDownloader/issues/1028
Related Vulnerabilities
CVE-2021-23434 Vulnerability in npm package object-path
CVE-2020-5529 Vulnerability in maven package net.sourceforge.htmlunit:htmlunit
CVE-2020-28276 Vulnerability in npm package deep-set
CVE-2022-23305 Vulnerability in maven package log4j:log4j
CVE-2021-3644 Vulnerability in maven package org.wildfly.core:wildfly-controller