Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core
Vulnerability Description
Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Object Computing micronaut 路径遍历漏洞
Vulnerability Description
Object Computing micronaut是美国Object Computing公司的一款基于JVM的全栈框架,它主要用于构建模块化微服务和无服务器应用程序。 Micronaut 2.5.9 之前的版本存在路径遍历漏洞,该漏洞源于Micronaut 不限制对配置路径的文件访问。攻击者通过基本配置,可以使用 URL 中的“/../../”从文件系统访问任何文件。
CVSS Information
N/A
Vulnerability Type
N/A