Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1td2g5LWdyNDUteHZ2NM4AAh8b
Mule modules contain Directory Traversal
Directory Traversal in APIkit, http-connector, and OAuth2 Provider modules in Mulesoft 3.x, 4.x and Mulesoft API Gateway (all versions) released before August 1, 2019 allow remote attackers to read files accessible to the Mule process.
Permalink: https://github.com/advisories/GHSA-mwh9-gr45-xvv4JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1td2g5LWdyNDUteHZ2NM4AAh8b
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 8 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-mwh9-gr45-xvv4, CVE-2019-15630
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-15630
- https://help.mulesoft.com/s/article/Directory-traversal-vulnerability-affecting-runtimes-of-MuleSoft-customers-running-certain-use-cases-of-Mule-flows-and-API-Gateways
- https://github.com/advisories/GHSA-mwh9-gr45-xvv4
Affected Packages
maven:org.mule.runtime:mule
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 3.0.0, <= 4.1.5
No known fixed version
All affected versions: 4.1.1