First published: Mon Jan 23 2017(Updated: )
hawtio before versions 2.0-beta-1, 2.0-beta-2 2.0-m1, 2.0-m2, 2.0-m3, and 1.5 is vulnerable to a path traversal that leads to a NullPointerException with a full stacktrace. An attacker could use this flaw to gather undisclosed information from within hawtio's root.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hawtio 2.0-beta | <1 | 1 |
redhat/hawtio 2.0-beta-2 hawtio | <2.0 | 2.0 |
redhat/hawtio | <2.0 | 2.0 |
redhat/hawtio | <1.5 | 1.5 |
Red Hat Hawtio | <=1.4.68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2594 is classified as a medium severity vulnerability due to its potential to expose sensitive information through a path traversal attack.
To fix CVE-2017-2594, upgrade to a version of Hawtio later than 1.4.68 that is not affected by this vulnerability.
CVE-2017-2594 is a path traversal vulnerability that allows attackers to manipulate file paths within the application.
An attacker exploiting CVE-2017-2594 could potentially obtain undisclosed information from the root of Hawtio.
CVE-2017-2594 affects Hawtio versions prior to 2.0-beta-1, 2.0-beta-2, 2.0-m1, 2.0-m2, 2.0-m3, and up to 1.4.68.