Description
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v49x-8hvm-q347 | Exposure of Sensitive Information in Apache Pluto |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T18:49:31.524Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1306
No data.
Status : Modified
Published: 2018-06-27T18:29:00.553
Modified: 2024-11-21T03:59:35.460
Link: CVE-2018-1306
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA