Lucene search

K
githubGitHub Advisory DatabaseGHSA-VP62-M958-QJ8C
HistoryJan 04, 2023 - 12:30 a.m.

Gravitee API Management contains Path Traversal

2023-01-0400:30:26
CWE-22
CWE-79
GitHub Advisory Database
github.com
39
gravitee api management
path traversal
html injection
email service
arbitrary files
security patch

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

EPSS

0.002

Percentile

53.2%

This CVE addresses the partial fix for CVE-2019-25075

Gravitee API Management before 3.15.13 allows path traversal through HTML injection. A certain HTML injection combined with path traversal in the Email service in Gravitee API Management before 3.15.13 allows anonymous users to read arbitrary files via a /management/users/register request.

A patch was published in 2019 for this vulnerability but did not appear to have solved the issue. Version 3.15.13 did remove the flaw.

Affected configurations

Vulners
Node
logstash-management-api_projectlogstash-management-apiRange<3.15.13
VendorProductVersionCPE
logstash-management-api_projectlogstash-management-api*cpe:2.3:a:logstash-management-api_project:logstash-management-api:*:*:*:*:*:*:*:*

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

EPSS

0.002

Percentile

53.2%

Related for GHSA-VP62-M958-QJ8C