Skip to main content

CVE-2022-24718: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Finastra ssr-pages

Medium
Published: Tue Mar 01 2022 (03/01/2022, 18:45:13 UTC)
Source: CVE
Vendor/Project: Finastra
Product: ssr-pages

Description

ssr-pages is an HTML page builder for the purpose of server-side rendering (SSR). In versions prior to 0.1.4, a path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. While there is no known workaround at this time, there is a patch in version 0.1.4.

AI-Powered Analysis

AILast updated: 06/23/2025, 15:00:20 UTC

Technical Analysis

CVE-2022-24718 is a path traversal vulnerability identified in the Finastra ssr-pages product, an HTML page builder designed for server-side rendering (SSR). This vulnerability affects versions prior to 0.1.4 of ssr-pages. The core issue lies in improper limitation of a pathname to a restricted directory (CWE-22), specifically when untrusted input is provided to the `svg` property argument in the `build(MessagePageOptions)` function. Path traversal vulnerabilities allow an attacker to manipulate file paths to access files and directories outside the intended scope, potentially exposing sensitive files or enabling unauthorized file operations. In this case, the vulnerability arises because the input to the `svg` property is not properly sanitized or validated, allowing crafted input to traverse directories on the server. Although no known exploits have been reported in the wild, the vulnerability was publicly disclosed on March 1, 2022, and a patch was released in version 0.1.4 to address the issue. The lack of a workaround means that affected users must upgrade to the patched version to mitigate the risk. The vulnerability does not require authentication or user interaction to exploit, assuming the attacker can supply input to the vulnerable function, which is typical in SSR page rendering contexts where user input might be processed. The potential impact includes unauthorized access to server files, which could lead to information disclosure, modification of server-side resources, or further exploitation depending on the server environment and permissions. Given the nature of SSR and the role of ssr-pages in rendering HTML content, exploitation could also facilitate injection of malicious content or compromise of the web application’s integrity and confidentiality.

Potential Impact

For European organizations, the impact of CVE-2022-24718 can be significant, especially for those in the financial, technology, and web services sectors that utilize Finastra's ssr-pages for server-side rendering. Unauthorized file access could lead to exposure of sensitive business data, customer information, or intellectual property, undermining confidentiality. Integrity of web content could be compromised, potentially damaging brand reputation and trust. Availability impact is less direct but could occur if attackers manipulate server files to disrupt service. Given Finastra’s prominence in financial software, organizations in banking and financial services across Europe are particularly at risk. Exploitation could also facilitate lateral movement within networks if attackers gain access to configuration files or credentials stored on the server. The absence of known exploits reduces immediate risk, but the medium severity and ease of exploitation without authentication mean that organizations should prioritize remediation to prevent potential attacks. Regulatory implications under GDPR and other data protection laws could arise if sensitive data is exposed, leading to legal and financial consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all instances of Finastra ssr-pages to version 0.1.4 or later, where the patch addressing the path traversal issue has been applied. In addition to patching, organizations should implement strict input validation and sanitization on all user-supplied data, especially inputs that influence file paths or resource loading in SSR contexts. Employing allowlists for file paths or resource names can further restrict unauthorized access. Web application firewalls (WAFs) should be configured to detect and block path traversal patterns in HTTP requests. Regular code reviews and security testing focused on SSR components can help identify similar vulnerabilities proactively. Monitoring server logs for unusual file access attempts or errors related to file path resolution can provide early detection of exploitation attempts. Finally, organizations should ensure that server file permissions follow the principle of least privilege, limiting the impact of any successful path traversal by restricting accessible directories and files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf26f5

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 3:00:20 PM

Last updated: 7/26/2025, 12:51:13 PM

Views: 34

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats