GHSA-prfw-3qx6-g9xr

Suggest an improvement
Source
https://github.com/advisories/GHSA-prfw-3qx6-g9xr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-prfw-3qx6-g9xr/GHSA-prfw-3qx6-g9xr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-prfw-3qx6-g9xr
Aliases
Published
2022-05-13T01:12:24Z
Modified
2023-11-08T03:59:43.450117Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Improper Limitation of a Pathname to a Restricted Directory in Jboss EAP Undertow
Details

It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOWENCODEDSLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.

Database specific
{
    "nvd_published_at": "2018-01-24T23:29:00Z",
    "github_reviewed_at": "2022-06-30T14:01:42Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Maven / org.jboss.eap:wildfly-undertow

Package

Name
org.jboss.eap:wildfly-undertow
View open source insights on deps.dev
Purl
pkg:maven/org.jboss.eap/wildfly-undertow

Affected ranges

Type
ECOSYSTEM
Events
Introduced
7.1.0.GA
Fixed
7.1.1.GA

Affected versions

7.*

7.1.0.GA