Directory traversal vulnerability in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows, allows remote attackers to read arbitrary files via a .. (dot dot) in a resource URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1157478 | vendor advisory |
http://www.securityfocus.com/bid/71328 | vdb entry |
https://issues.jboss.org/browse/UNDERTOW-338 | vendor advisory |
https://issues.jboss.org/browse/WFLY-4020 | vendor advisory |
http://seclists.org/oss-sec/2014/q4/830 | mailing list |