Description
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
Remediation
References
Related Vulnerabilities
MySQL CVE-2016-0661 Vulnerability (CVE-2016-0661)
Oracle Database Server Other Vulnerability (CVE-1999-0784)
Apache HTTP Server Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2007-6420)
Moodle Credentials Management Errors Vulnerability (CVE-2014-7845)
WordPress Plugin PushEngage Web Push Notifications Cross-Site Scripting (1.5.8)