Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32287: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Software Foundation Apache UIMA

0
High
VulnerabilityCVE-2022-32287cvecve-2022-32287cwe-22
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache UIMA

Description

A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:54:44 UTC

Technical Analysis

CVE-2022-32287 is a high-severity path traversal vulnerability (CWE-22) found in the Apache UIMA (Unstructured Information Management Architecture) framework, specifically in a FileUtil class used by the PEAR management component. The vulnerability arises because the FileUtil class does not properly restrict pathname inputs when extracting ZIP archives, allowing an attacker to craft malicious ZIP entry names that traverse directories and create files outside the intended target directory. This can lead to unauthorized file creation anywhere on the filesystem accessible by the Java Virtual Machine (JVM) running Apache UIMA. The affected versions include Apache UIMA 3.3.0 and all prior versions. The PEAR files involved are executable plugins, meaning that if an attacker can supply a malicious PEAR archive, they can execute arbitrary code with the same privileges as the host JVM. The vulnerability requires no authentication or user interaction and can be exploited remotely if an attacker can supply or influence the PEAR archive installation process. The CVSS v3.1 base score is 7.5 (High), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity impact and no availability impact. No known exploits in the wild have been reported to date. The vulnerability highlights the risk of installing PEAR archives from untrusted sources, as these archives can execute arbitrary code once installed. This vulnerability is particularly critical for environments where Apache UIMA is used to process untrusted or user-supplied PEAR archives, as it can lead to arbitrary file creation and potential code execution on the host system.

Potential Impact

For European organizations using Apache UIMA, especially those in sectors processing large volumes of unstructured data such as research institutions, government agencies, and enterprises in finance or healthcare, this vulnerability poses a significant risk. Exploitation can lead to unauthorized file creation outside designated directories, potentially overwriting critical files or planting malicious payloads. Since PEAR archives are executable plugins, a successful attack could result in arbitrary code execution with the privileges of the JVM, leading to system compromise, data integrity loss, and lateral movement within the network. The lack of confidentiality impact in the CVSS score suggests data leakage is not the primary concern; however, integrity and availability of critical systems could be severely affected. Given the network attack vector and no requirement for authentication or user interaction, attackers could remotely exploit this vulnerability if they can influence the PEAR archive installation process, making it a viable threat in multi-tenant or cloud environments. The impact is heightened in environments where patching is slow or where legacy versions of Apache UIMA are in use. Additionally, the potential for supply chain attacks via malicious PEAR archives could affect organizations relying on third-party plugins or extensions.

Mitigation Recommendations

1. Immediately upgrade Apache UIMA to a version that addresses this vulnerability once available. If no patched version is available, consider applying any vendor-provided workarounds or patches. 2. Strictly restrict the sources of PEAR archives to trusted and verified providers; do not install PEAR files from untrusted or unknown sources. 3. Implement rigorous validation and sanitization of ZIP entry names before extraction to prevent path traversal, ensuring that extracted files remain within the intended directory. 4. Employ runtime security controls such as Java Security Manager policies or containerization to limit the filesystem and process privileges of the JVM running Apache UIMA, minimizing the impact of potential exploitation. 5. Monitor file system changes and audit PEAR archive installations for unusual activity or unauthorized file creations. 6. In environments where PEAR archives are installed automatically or via CI/CD pipelines, introduce integrity checks and signature verification to prevent malicious archives from being deployed. 7. Educate developers and administrators about the risks of installing untrusted plugins and enforce strict operational security policies around plugin management. 8. Consider network segmentation and access controls to limit exposure of Apache UIMA services to untrusted networks or users.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-06-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb8f9

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 7/3/2025, 6:54:44 AM

Last updated: 2/7/2026, 5:28:05 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats