Path traversal in Undertow for Wildfly Application Server



Published: 2014-12-01 | Updated: 2019-08-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2014-7816
CWE-ID CWE-22
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Undertow
Server applications / Web servers

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Path traversal

EUVDB-ID: #VU20070

Risk: Low

CVSSv3.1: 3.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N/E:F/RL:O/RC:C]

CVE-ID: CVE-2014-7816

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in JBoss Undertow 1.0.x before 1.0.17, 1.1.x before 1.1.0.CR5, and 1.2.x before 1.2.0.Beta3, when running on Windows. A remote non-authenticated attacker can send a specially crafted HTTP request containing directory traversal sequences and view contents of arbitrary files on the server.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Undertow: 1.0.0 - 1.0.16

External links

http://issues.jboss.org/browse/WFLY-4020
http://issues.jboss.org/browse/UNDERTOW-338
http://bugzilla.redhat.com/show_bug.cgi?id=1157478
http://www.securityfocus.com/bid/71328
http://seclists.org/oss-sec/2014/q4/830


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###