Vulnerability CVE-2014-0053


Published: 2014-04-15   Modified: 2014-04-16

Description:
The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Grails 2.3.5 Information Disclosure
Ramsharan065
20.02.2014

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Gopivotal -> Grails 
Gopivotal -> Resources 
Gopivotal -> Grails-resources 

 References:
http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0194.html
http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html
http://www.gopivotal.com/security/cve-2014-0053
http://www.securityfocus.com/archive/1/531281/100/0/threaded
http://www.securityfocus.com/bid/65678
https://exchange.xforce.ibmcloud.com/vulnerabilities/91270
https://twitter.com/Ramsharan065/status/434975409134792704

Copyright 2024, cxsecurity.com

 

Back to Top