Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xjhv-p3fv-x24r

Опубликовано: 15 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

In Reactor Netty HTTP Server a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.

Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

Пакеты

Наименование

io.projectreactor.netty:reactor-netty-http

maven
Затронутые версииВерсия исправления

>= 1.1.0, < 1.1.13

1.1.13

Наименование

io.projectreactor.netty:reactor-netty-http

maven
Затронутые версииВерсия исправления

>= 1.0.0, < 1.0.39

1.0.39

EPSS

Процентиль: 83%
0.01851
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
redhat
около 2 лет назад

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

CVSS3: 7.5
nvd
около 2 лет назад

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

CVSS3: 7.5
fstec
около 2 лет назад

Уязвимость HTTP-сервера Reactor Netty, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 83%
0.01851
Низкий

7.5 High

CVSS3

Дефекты

CWE-22