Lucene search

K
githubGitHub Advisory DatabaseGHSA-V76W-3PH8-VM66
HistoryFeb 12, 2024 - 9:30 p.m.

Undertow Path Traversal vulnerability

2024-02-1221:30:55
CWE-24
GitHub Advisory Database
github.com
8
path traversal
vulnerability
undertow
jboss eap
remote attacker
http request
privileged files

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

37.1%

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

Affected configurations

Vulners
Node
io.undertowundertow-coreRange2.3.0.Alpha12.3.12.Final
OR
io.undertowundertow-coreRange<2.2.31.Final
VendorProductVersionCPE
io.undertowundertow-core*cpe:2.3:a:io.undertow:undertow-core:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.2

Confidence

Low

EPSS

0.001

Percentile

37.1%