Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.faces.resource/web.xml or (2) the PATH_INFO to faces/javax.faces.resource/.
References
Link | Resource |
---|---|
http://mail-archives.apache.org/mod_mbox/myfaces-announce/201202.mbox/%3C4F33ED1F.4070007%40apache.org%3E | Exploit Vendor Advisory |
http://osvdb.org/show/osvdb/79002 | Broken Link |
http://seclists.org/fulldisclosure/2012/Feb/150 | Exploit Mailing List Third Party Advisory |
http://secunia.com/advisories/47973 | Third Party Advisory |
http://www.securityfocus.com/bid/51939 | Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73100 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-06-19 14:55
Updated : 2024-02-04 18:35
NVD link : CVE-2011-4367
Mitre link : CVE-2011-4367
CVE.ORG link : CVE-2011-4367
JSON object : View
Products Affected
apache
- myfaces
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')