Skip to main content

CVE-2022-32287: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Software Foundation Apache UIMA

High
VulnerabilityCVE-2022-32287cvecve-2022-32287cwe-22
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache UIMA

Description

A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:54:44 UTC

Technical Analysis

CVE-2022-32287 is a high-severity path traversal vulnerability (CWE-22) found in the Apache UIMA (Unstructured Information Management Architecture) framework, specifically in a FileUtil class used by the PEAR management component. The vulnerability arises because the FileUtil class does not properly restrict pathname inputs when extracting ZIP archives, allowing an attacker to craft malicious ZIP entry names that traverse directories and create files outside the intended target directory. This can lead to unauthorized file creation anywhere on the filesystem accessible by the Java Virtual Machine (JVM) running Apache UIMA. The affected versions include Apache UIMA 3.3.0 and all prior versions. The PEAR files involved are executable plugins, meaning that if an attacker can supply a malicious PEAR archive, they can execute arbitrary code with the same privileges as the host JVM. The vulnerability requires no authentication or user interaction and can be exploited remotely if an attacker can supply or influence the PEAR archive installation process. The CVSS v3.1 base score is 7.5 (High), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but high integrity impact and no availability impact. No known exploits in the wild have been reported to date. The vulnerability highlights the risk of installing PEAR archives from untrusted sources, as these archives can execute arbitrary code once installed. This vulnerability is particularly critical for environments where Apache UIMA is used to process untrusted or user-supplied PEAR archives, as it can lead to arbitrary file creation and potential code execution on the host system.

Potential Impact

For European organizations using Apache UIMA, especially those in sectors processing large volumes of unstructured data such as research institutions, government agencies, and enterprises in finance or healthcare, this vulnerability poses a significant risk. Exploitation can lead to unauthorized file creation outside designated directories, potentially overwriting critical files or planting malicious payloads. Since PEAR archives are executable plugins, a successful attack could result in arbitrary code execution with the privileges of the JVM, leading to system compromise, data integrity loss, and lateral movement within the network. The lack of confidentiality impact in the CVSS score suggests data leakage is not the primary concern; however, integrity and availability of critical systems could be severely affected. Given the network attack vector and no requirement for authentication or user interaction, attackers could remotely exploit this vulnerability if they can influence the PEAR archive installation process, making it a viable threat in multi-tenant or cloud environments. The impact is heightened in environments where patching is slow or where legacy versions of Apache UIMA are in use. Additionally, the potential for supply chain attacks via malicious PEAR archives could affect organizations relying on third-party plugins or extensions.

Mitigation Recommendations

1. Immediately upgrade Apache UIMA to a version that addresses this vulnerability once available. If no patched version is available, consider applying any vendor-provided workarounds or patches. 2. Strictly restrict the sources of PEAR archives to trusted and verified providers; do not install PEAR files from untrusted or unknown sources. 3. Implement rigorous validation and sanitization of ZIP entry names before extraction to prevent path traversal, ensuring that extracted files remain within the intended directory. 4. Employ runtime security controls such as Java Security Manager policies or containerization to limit the filesystem and process privileges of the JVM running Apache UIMA, minimizing the impact of potential exploitation. 5. Monitor file system changes and audit PEAR archive installations for unusual activity or unauthorized file creations. 6. In environments where PEAR archives are installed automatically or via CI/CD pipelines, introduce integrity checks and signature verification to prevent malicious archives from being deployed. 7. Educate developers and administrators about the risks of installing untrusted plugins and enforce strict operational security policies around plugin management. 8. Consider network segmentation and access controls to limit exposure of Apache UIMA services to untrusted networks or users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-06-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb8f9

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 7/3/2025, 6:54:44 AM

Last updated: 8/4/2025, 12:17:50 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats