CVE-2020-1745 – io.undertow:undertow-core
Package
Manager: maven
Name: io.undertow:undertow-core
Vulnerable Version: >=0 <2.0.30
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.02021 pctl0.83056
Details
Improper Authorization in Undertoe A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.
Metadata
Created: 2022-05-24T17:16:46Z
Modified: 2022-06-24T01:25:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-gv2w-88hx-8m9r/GHSA-gv2w-88hx-8m9r.json
CWE IDs: ["CWE-285"]
Alternative ID: GHSA-gv2w-88hx-8m9r
Finding: F039
Auto approve: 1