First published: Mon Jan 15 2018(Updated: )
It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1048 has been rated as a medium severity vulnerability due to its potential for path traversal and information disclosure.
To fix CVE-2018-1048, you should upgrade JBoss EAP to version 7.1.1 or later, which includes mitigations for this vulnerability.
CVE-2018-1048 specifically affects Red Hat JBoss Enterprise Application Platform version 7.1.0.
The impact of CVE-2018-1048 is that it allows attackers to exploit the vulnerability to disclose arbitrary local files through path traversal.
There are no official workarounds for CVE-2018-1048, so upgrading to an unaffected version is recommended.