Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-2857

Опубликовано: 15 апр. 2014
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:gopivotal:grails-resources:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails-resources:1.2.5:*:*:*:*:*:*:*

Одно из

cpe:2.3:a:gopivotal:grails:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gopivotal:grails:2.3.6:*:*:*:*:*:*:*

EPSS

Процентиль: 51%
0.00283
Низкий

5 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

debian
почти 12 лет назад

The default configuration of the Resources plugin 1.0.0 before 1.2.6 f ...

github
больше 3 лет назад

The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.

EPSS

Процентиль: 51%
0.00283
Низкий

5 Medium

CVSS2

Дефекты

CWE-264