Description
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
Published: 2022-05-21
Score: 7.5 High
EPSS: 90.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2c65-rq62-fqhq Path traversal in Gitblit
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.79776}

epss

{'score': 0.7704}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T07:11:39.893Z

Reserved: 2022-05-21T00:00:00.000Z

Link: CVE-2022-31268

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-21T21:15:52.057

Modified: 2024-11-21T07:04:15.980

Link: CVE-2022-31268

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses