Path Traversal and Improper Input Validation in Apache Commons IO
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Apr 26, 2021 
          to the GitHub Advisory Database
          •
          Updated Feb 14, 2024 
      
  
Description
        Published by the National Vulnerability Database
      Apr 13, 2021 
    
  
        Reviewed
      Apr 26, 2021 
    
  
        Published to the GitHub Advisory Database
      Apr 26, 2021 
    
  
        Last updated
      Feb 14, 2024 
    
  
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
References