- Description
- Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-22
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6F62EEF4-CA08-4D25-A30A-9558917B72DF",
"versionEndIncluding": "1.0.16"
},
{
"criteria": "cpe:2.3:a:redhat:undertow:*:cr4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "177B2EDB-74E0-4988-9622-DD9E33A8B1E1",
"versionEndIncluding": "1.1.0"
},
{
"criteria": "cpe:2.3:a:redhat:undertow:*:beta2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A991B45C-C1CC-4A8B-A208-3BC46317BEFE",
"versionEndIncluding": "1.2.0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]