Description
An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3922 | An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy. |
Github GHSA |
GHSA-g7wm-22m6-5774 | Asset Pipeline plugin for Grails vulnerable to Path Traversal |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:54:10.525Z
Reserved: 2018-09-28T00:00:00.000Z
Link: CVE-2018-17605
No data.
Status : Modified
Published: 2018-09-28T09:29:01.213
Modified: 2024-11-21T03:54:41.023
Link: CVE-2018-17605
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA