Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7816

Опубликовано: 28 окт. 2014
Источник: redhat
CVSS2: 5

Описание

Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.

It was discovered that Undertow is vulnerable to a directory traversal flaw. A remote attacker could use this flaw to read arbitrary files that are accessible to the user running the Java process.

Отчет

Not vulnerable. This issue does not affect any Red Hat product.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1allNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-22->CWE-552->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1157478Undertow: Information disclosure via directory traversal

5 Medium

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.

debian
около 11 лет назад

Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.1 ...

github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow

5 Medium

CVSS2