Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-0053

Опубликовано: 15 апр. 2014
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:gopivotal:grails-resources:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.5:*:*:*:*:*:*:*

Одно из

cpe:2.3:a:gopivotal:grails:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.5:*:*:*:*:*:*:*

EPSS

Процентиль: 71%
0.0069
Низкий

5 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

debian
почти 12 лет назад

The default configuration of the Resources plugin 1.0.0 before 1.2.6 f ...

github
больше 3 лет назад

The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

EPSS

Процентиль: 71%
0.0069
Низкий

5 Medium

CVSS2

Дефекты

CWE-264