
We found results for “”
CVE-2018-1048
Good to know:


Date: January 24, 2018
It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.
Language: Java
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version io.syndesis.meta:meta:1.3.5;org.amqphub.jca:resource-adapter-thorntail-example:no_fix;io.undertow:undertow-core:2.0.29.Final;io.undertow:undertow-core:2.0.27.Final;io.undertow:undertow-core:2.0.30.Final;io.undertow:undertow-core:2.0.20.Final;io.undertow:undertow-core:2.0.0.Final;io.undertow:undertow-core:2.0.1.Final;io.undertow:undertow-core:2.0.10.Final;io.undertow:undertow-core:2.0.16.Final;io.undertow:undertow-core:2.0.21.Final;io.undertow:undertow-core:2.0.26.Final;io.undertow:undertow-core:2.0.29.Final;io.undertow:undertow-core:2.0.22.Final;io.undertow:undertow-core:2.0.24.Final;io.undertow:undertow-core:2.0.14.Final;io.undertow:undertow-core:2.0.23.Final;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;org.jboss.eap:wildfly-client-all:no_fix;io.syndesis.server:server-runtime:1.3.5
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |