Skip to main content

CVE-2022-45866: n/a in n/a

Medium
VulnerabilityCVE-2022-45866cvecve-2022-45866n-acwe-22
Published: Wed Nov 23 2022 (11/23/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

qpress before PierreLvx/qpress 20220819 and before version 11.3, as used in Percona XtraBackup and other products, allows directory traversal via ../ in a .qp file.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:06:29 UTC

Technical Analysis

CVE-2022-45866 is a directory traversal vulnerability identified in qpress, a compression utility used notably in Percona XtraBackup and potentially other products. The vulnerability exists in versions of qpress prior to 20220819 and before version 11.3. The issue arises because qpress improperly handles file paths within .qp archive files, allowing an attacker to include '../' sequences that traverse directories outside the intended extraction path. This can lead to files being written to arbitrary locations on the filesystem during decompression. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating that the software fails to properly sanitize or validate file paths. The CVSS v3.1 base score is 5.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild, and no official patches or vendor advisories are linked in the provided data. The vulnerability allows an unauthenticated attacker to craft a malicious .qp archive that, when decompressed by a vulnerable qpress version, can write files outside the intended directory, potentially overwriting critical files or planting malicious payloads. This could be leveraged for local privilege escalation or persistence if the decompression is performed by a privileged process or service. However, the impact is limited to confidentiality as no direct integrity or availability impacts are indicated by the CVSS vector. The vulnerability requires that the victim decompress a malicious archive, which may be delivered via network or other means depending on the deployment context of qpress or Percona XtraBackup. Since no user interaction is required, automated processes decompressing untrusted archives are at risk. The lack of a vendor project or product name beyond qpress and Percona XtraBackup suggests the vulnerability may affect multiple products embedding qpress for compression tasks.

Potential Impact

For European organizations, the primary impact of CVE-2022-45866 lies in the potential unauthorized disclosure of sensitive data or exposure of system files due to directory traversal during decompression. Organizations using Percona XtraBackup or other products embedding vulnerable qpress versions may face risks of attackers placing malicious files in arbitrary locations, which could facilitate further attacks such as privilege escalation or persistence. While the vulnerability does not directly compromise integrity or availability, the ability to write files outside intended directories can undermine system security and trustworthiness. This is particularly critical for organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and critical infrastructure operators, where backup integrity and confidentiality are paramount. Additionally, automated backup or restoration processes that decompress untrusted archives without validation are at risk. The medium severity score reflects a moderate risk; however, the actual impact depends on the deployment context, privilege level of the decompression process, and exposure to untrusted archive files. Since no known exploits are reported, the immediate threat may be low, but the vulnerability should be addressed promptly to prevent potential exploitation. European organizations relying on Percona XtraBackup for MySQL or MariaDB backups, or other software incorporating vulnerable qpress versions, should assess their exposure and remediate accordingly.

Mitigation Recommendations

1. Upgrade qpress to version 20220819 or later, or version 11.3 or later, where the directory traversal vulnerability is fixed. 2. For Percona XtraBackup users, update to the latest version that includes the patched qpress component. 3. Implement strict validation and sanitization of archive files before decompression, especially if archives originate from untrusted or external sources. 4. Restrict decompression operations to run with the least privileges necessary to minimize potential impact of arbitrary file writes. 5. Employ sandboxing or containerization for decompression processes to contain any malicious file writes within isolated environments. 6. Monitor file system changes in directories used for decompression to detect unexpected file creations or modifications. 7. Review backup and restore workflows to ensure that only trusted archives are processed and that integrity checks (e.g., cryptographic signatures) are in place. 8. If immediate patching is not feasible, consider disabling automatic decompression of .qp files or restricting access to decompression utilities. 9. Maintain up-to-date asset inventories to identify all systems using vulnerable qpress versions for targeted remediation. 10. Educate system administrators and security teams about this vulnerability and the importance of verifying archive sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-23T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbeff92

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:06:29 PM

Last updated: 8/12/2025, 9:41:01 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats