Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |
https://github.com/eclipse-ee4j/mojarra/issues/4571 | issue tracking third party advisory |
https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741 | third party advisory patch |
https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943 | issue tracking vendor advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |