Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w7c4-5w4f-jm3g

Опубликовано: 05 авг. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.8
CVSS3: 8.6

Описание

Duplicate Advisory: Reposilite Arbitrary File Read vulnerability

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-82j3-hf72-7x93. This link is maintained to preserve external references.

Original description

Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no known workarounds for this vulnerability. This issue was discovered and reported by the GitHub Security lab and is also tracked as GHSL-2024-074.

Пакеты

Наименование

com.reposilite:reposilite-backend

maven
Затронутые версииВерсия исправления

>= 3.3.0, < 3.5.12

3.5.12

EPSS

Процентиль: 99%
0.77573
Высокий

8.8 High

CVSS4

8.6 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 8.6
nvd
больше 1 года назад

Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no known workarounds for this vulnerability. This issue was discovered and reported by the GitHub Security lab and is also tracked as GHSL-2024-074.

EPSS

Процентиль: 99%
0.77573
Высокий

8.8 High

CVSS4

8.6 High

CVSS3

Дефекты

CWE-22