CVE-2018-17605

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-17605
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-17605.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-17605
Aliases
Published
2018-09-28T09:29:01Z
Modified
2024-09-03T02:06:43.174523Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.

References

Affected packages

Git / github.com/bertramdev/asset-pipeline

Affected ranges

Type
GIT
Repo
https://github.com/bertramdev/asset-pipeline
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

rel-0.*

rel-0.6.1
rel-0.6.3

rel-2.*

rel-2.0.10
rel-2.0.16
rel-2.0.17
rel-2.0.3
rel-2.0.4
rel-2.1.0
rel-2.1.1
rel-2.10.0
rel-2.10.1
rel-2.10.2
rel-2.10.3
rel-2.11.0
rel-2.11.1
rel-2.11.3
rel-2.11.5
rel-2.11.6
rel-2.12.0
rel-2.12.2
rel-2.12.4
rel-2.12.5
rel-2.12.6
rel-2.12.7
rel-2.12.8
rel-2.12.9
rel-2.13.0
rel-2.13.1
rel-2.13.2
rel-2.14.0
rel-2.14.10
rel-2.14.3
rel-2.14.4
rel-2.14.7
rel-2.15.0
rel-2.2.0
rel-2.2.1
rel-2.2.3
rel-2.2.4
rel-2.2.5
rel-2.3.0
rel-2.3.2
rel-2.3.4
rel-2.3.7
rel-2.3.8
rel-2.4.0
rel-2.4.1
rel-2.4.2
rel-2.4.3
rel-2.5.0
rel-2.5.2
rel-2.5.3
rel-2.5.4
rel-2.5.8
rel-2.6.0
rel-2.6.2
rel-2.6.3
rel-2.6.4
rel-2.6.7
rel-2.6.9
rel-2.7.0
rel-2.7.2
rel-2.7.4
rel-2.8.0
rel-2.8.1
rel-2.8.2
rel-2.9.0
rel-2.9.1
rel-2.9.2
rel-2.9.3

rel-3.*

rel-3.0.0
rel-3.0.1
rel-3.0.2