First published: Thu Jun 19 2014(Updated: )
Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.faces.resource/web.xml or (2) the PATH_INFO to faces/javax.faces.resource/.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache MyFaces | >=2.0.1<=2.0.11 | |
Apache MyFaces | >=2.1.0<=2.1.5 | |
maven/org.apache.myfaces.core:myfaces-impl | >=2.1.0<2.1.6 | 2.1.6 |
maven/org.apache.myfaces.core:myfaces-impl | >=2.0.0<2.0.12 | 2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4367 is considered a high severity vulnerability due to its potential for directory traversal allowing unauthorized file access.
To fix CVE-2011-4367, upgrade to Apache MyFaces Core version 2.0.12 or 2.1.6 or later.
CVE-2011-4367 affects Apache MyFaces Core versions 2.0.x before 2.0.12 and 2.1.x before 2.1.6.
While CVE-2011-4367 primarily allows unauthorized file access, it may lead to further vulnerabilities and potential remote code execution in certain conditions.
To detect CVE-2011-4367, review your application's MyFaces version and check for any instances of directory traversal patterns in your web applications.