An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-3922 An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
Github GHSA Github GHSA GHSA-g7wm-22m6-5774 Asset Pipeline plugin for Grails vulnerable to Path Traversal
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T10:54:10.525Z

Reserved: 2018-09-28T00:00:00

Link: CVE-2018-17605

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-28T09:29:01.213

Modified: 2024-11-21T03:54:41.023

Link: CVE-2018-17605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses