Lucene search

K
cvelistVmwareCVELIST:CVE-2023-34062
HistoryNov 15, 2023 - 9:46 a.m.

CVE-2023-34062

2023-11-1509:46:42
vmware
www.cve.org
6
reactor netty
http server
directory traversal

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

38.6%

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.

Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Reactor Netty",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "1.1.13",
        "status": "affected",
        "version": "1.1.0",
        "versionType": "custom"
      },
      {
        "lessThan": "1.0.39",
        "status": "affected",
        "version": "1.0.0",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "older unsupported versions"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

38.6%