Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14amh2LXAzZnYteDI0cs4AA3MH
In Reactor Netty HTTP Server a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Permalink: https://github.com/advisories/GHSA-xjhv-p3fv-x24rJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14amh2LXAzZnYteDI0cs4AA3MH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 13 days ago
Updated: 13 days ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-xjhv-p3fv-x24r, CVE-2023-34062
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-34062
- https://spring.io/security/cve-2023-34062
- https://github.com/advisories/GHSA-xjhv-p3fv-x24r
Affected Packages
maven:io.projectreactor.netty:reactor-netty-http
Versions: >= 1.0.0, < 1.0.39, >= 1.1.0, < 1.1.13Fixed in: 1.0.39, 1.1.13