Описание
Directory traversal in Eclipse Mojarra
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-6950
- https://github.com/eclipse-ee4j/mojarra/issues/4571
- https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Пакеты
org.glassfish:mojarra-parent
< 2.3.14
2.3.14
Связанные уязвимости
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers ...
Уязвимость компонента Web Container (JavaServer Faces) сервера приложений Oracle WebLogic Server, позволяющая нарушителю раскрыть защищаемую информацию