An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
{ "nvd_published_at": "2018-09-28T09:29:00Z", "github_reviewed_at": "2022-11-22T19:24:42Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-22" ] }