logo

CVE-2018-1048 org.jboss.eap:wildfly-undertow

Package

Manager: maven
Name: org.jboss.eap:wildfly-undertow
Vulnerable Version: =7.1.0.ga || >=7.1.0.ga <7.1.1.ga

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0039 pctl0.59301

Details

Improper Limitation of a Pathname to a Restricted Directory in Jboss EAP Undertow It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.

Metadata

Created: 2022-05-13T01:12:24Z
Modified: 2022-06-30T14:01:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-prfw-3qx6-g9xr/GHSA-prfw-3qx6-g9xr.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-prfw-3qx6-g9xr
Finding: F063
Auto approve: 1