There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
References
Link | Resource |
---|---|
https://github.com/maybe-why-not/reponame/issues/2 | Exploit Third Party Advisory |
https://github.com/maybe-why-not/reponame/issues/2 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/maybe-why-not/reponame/issues/2 - Exploit, Third Party Advisory |
11 Apr 2022, 18:40
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/maybe-why-not/reponame/issues/2 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:caucho:resin:*:*:*:*:*:*:*:* | |
CWE | CWE-22 |
04 Apr 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-04 13:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44138
Mitre link : CVE-2021-44138
CVE.ORG link : CVE-2021-44138
JSON object : View
Products Affected
caucho
- resin
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')