Skip to main content

CVE-2022-2922: CWE-23 Relative Path Traversal in dnnsoftware dnnsoftware/dnn.platform

Medium
VulnerabilityCVE-2022-2922cvecve-2022-2922cwe-23
Published: Fri Sep 30 2022 (09/30/2022, 06:45:13 UTC)
Source: CVE
Vendor/Project: dnnsoftware
Product: dnnsoftware/dnn.platform

Description

Relative Path Traversal in GitHub repository dnnsoftware/dnn.platform prior to 9.11.0.

AI-Powered Analysis

AILast updated: 07/04/2025, 10:42:49 UTC

Technical Analysis

CVE-2022-2922 is a medium-severity vulnerability classified as a Relative Path Traversal (CWE-23) affecting the dnnsoftware/dnn.platform repository prior to version 9.11.0. This vulnerability allows an attacker with high privileges (PR:H) and network access (AV:N) to manipulate file paths by exploiting insufficient validation of user-supplied input that is used to construct file system paths. Specifically, the flaw enables an attacker to traverse directories relative to a base path, potentially accessing sensitive files outside the intended directory scope. The vulnerability does not require user interaction (UI:N) and does not impact integrity or availability but has a high impact on confidentiality (C:H). The CVSS 3.0 score is 4.9, reflecting a medium severity level. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though the issue is fixed in versions 9.11.0 and later. The vulnerability is network exploitable but requires authenticated access, limiting the attack surface to users with some level of privilege within the system. The dnnsoftware/dnn.platform is a web content management system (CMS) platform, often used by organizations to manage websites and digital content. Exploitation could allow attackers to read sensitive configuration files, credentials, or other protected data, potentially leading to further compromise or information disclosure.

Potential Impact

For European organizations using dnnsoftware/dnn.platform, this vulnerability poses a risk primarily to confidentiality of sensitive data. Attackers with authenticated access could leverage the path traversal to access files that may contain credentials, configuration details, or proprietary information. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability does not affect integrity or availability directly, the immediate operational disruption risk is lower; however, the exposure of sensitive information can facilitate subsequent attacks such as privilege escalation or lateral movement within networks. European organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face heightened risks and regulatory scrutiny if exploited. The requirement for authenticated access somewhat limits the threat to insiders or compromised accounts, but this does not eliminate the risk, especially in environments with weak access controls or credential management.

Mitigation Recommendations

To mitigate CVE-2022-2922, European organizations should prioritize upgrading dnnsoftware/dnn.platform to version 9.11.0 or later where the vulnerability is fixed. In the absence of immediate patching, organizations should implement strict access controls to limit authenticated user privileges, ensuring that only trusted users have access to sensitive file handling functions. Conduct thorough audits of user permissions and monitor for unusual file access patterns that may indicate exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts. Additionally, implement input validation and sanitization at the application level to prevent malicious path inputs. Regularly review and harden server file system permissions to restrict access to critical files and directories. Finally, maintain comprehensive logging and alerting to detect potential exploitation activities early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-08-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaea8

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 10:42:49 AM

Last updated: 8/12/2025, 10:48:04 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats