An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3922 | An issue was discovered in the Asset Pipeline plugin before 3.0.4 for Grails. An attacker can perform directory traversal via a crafted request when a servlet-based application is executed in Jetty, because there is a classloader vulnerability that can allow a reverse file traversal route in AssetPipelineFilter.groovy or AssetPipelineFilterCore.groovy. |
Github GHSA |
GHSA-g7wm-22m6-5774 | Asset Pipeline plugin for Grails vulnerable to Path Traversal |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:54:10.525Z
Reserved: 2018-09-28T00:00:00
Link: CVE-2018-17605
No data.
Status : Modified
Published: 2018-09-28T09:29:01.213
Modified: 2024-11-21T03:54:41.023
Link: CVE-2018-17605
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA