Описание
Asset Pipeline Grails Plugin Asset-pipeline plugin version Prior to 2.14.1.1, 2.15.1 and 3.0.6 contains a Incorrect Access Control vulnerability in Applications deployed in Jetty that can result in Download .class files and any arbitrary file. This attack appear to be exploitable via Specially crafted GET request containing directory traversal from assets-pipeline context. This vulnerability appears to have been fixed in 2.14.1.1 (for Grails 2.x), 2.15.1 (for Grails 3 and Java 7) and 3.0.6 (for Grails 3 and Java 8).
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.14.1.1 (исключая)
cpe:2.3:a:asset_pipeline_project:asset-pipeline:*:*:*:*:*:grails:*:*
Конфигурация 2Версия от 2.14.1.1 (исключая) до 2.15.1 (исключая)
cpe:2.3:a:asset_pipeline_project:asset-pipeline:*:*:*:*:*:grails:*:*
Конфигурация 3Версия от 2.15.1 (исключая) до 3.0.6 (исключая)
cpe:2.3:a:asset_pipeline_project:asset-pipeline:*:*:*:*:*:grails:*:*
EPSS
Процентиль: 68%
0.00561
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Asset Pipeline Grails Plugin vulnerable to Path Traversal
EPSS
Процентиль: 68%
0.00561
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22