Lucene search

K
githubGitHub Advisory DatabaseGHSA-V76W-3PH8-VM66
HistoryFeb 12, 2024 - 9:30 p.m.

Undertow Path Traversal vulnerability

2024-02-1221:30:55
CWE-24
GitHub Advisory Database
github.com
4
path traversal
vulnerability
undertow
jboss eap
remote attacker
http request
privileged files

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

Affected configurations

Vulners
Node
io.undertow\undertowMatchcore
OR
io.undertow\undertowMatchcore

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%