Description
Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-7924 | Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:50:47.438Z
Reserved: 2016-08-23T00:00:00.000Z
Link: CVE-2016-7041
No data.
Status : Modified
Published: 2018-09-10T16:29:00.417
Modified: 2024-11-21T02:57:20.350
Link: CVE-2016-7041
OpenCVE Enrichment
No data.
Weaknesses
EUVD