Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.

Subscriptions

Vendors Products
Objectcomputing Subscribe
Micronaut Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-1459 Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.
Github GHSA Github GHSA GHSA-cjx7-399x-p2rj Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:33:55.862Z

Reserved: 2021-05-12T00:00:00.000Z

Link: CVE-2021-32769

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-16T19:15:07.893

Modified: 2024-11-21T06:07:42.297

Link: CVE-2021-32769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses