Payara Micro Community 5.2021.6 and below allows Directory Traversal.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.payara.fish | product vendor advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt | third party advisory exploit |
http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html | exploit vdb entry third party advisory |
https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC | third party advisory exploit |
https://www.exploit-db.com/exploits/50371 | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2022/Nov/11 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html | exploit vdb entry third party advisory |