First published: Wed Oct 10 2018(Updated: )
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Vert.x | >=3.0.0<=3.5.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12542 is classified as a high-severity vulnerability due to its potential for path traversal leading to file system access outside the restricted directory.
To fix CVE-2018-12542, upgrade Eclipse Vert.x to version 3.5.4 or later where the vulnerability has been addressed.
The impacts of CVE-2018-12542 include unauthorized access to files and data outside of intended directories, potentially leading to information disclosure.
Eclipse Vert.x versions from 3.0.0 to 3.5.3 are affected by CVE-2018-12542.
CVE-2018-12542 primarily affects the Eclipse Vert.x framework and is not specific to any operating system, but the vulnerability can be exploited on systems running vulnerable versions.