Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-1459

Опубликовано: 12 фев. 2024
Источник: debian
EPSS Низкий

Описание

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
undertowfixed2.3.18-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2259475

  • https://github.com/advisories/GHSA-v76w-3ph8-vm66

  • https://github.com/undertow-io/undertow/pull/1556

  • https://issues.redhat.com/browse/UNDERTOW-2339

EPSS

Процентиль: 91%
0.06044
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

CVSS3: 5.3
redhat
около 2 лет назад

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

CVSS3: 5.3
nvd
почти 2 года назад

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

CVSS3: 5.3
github
почти 2 года назад

Undertow Path Traversal vulnerability

EPSS

Процентиль: 91%
0.06044
Низкий