First published: Wed Jun 27 2018(Updated: )
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Pluto | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1306 is considered a medium severity vulnerability due to its potential for sensitive information exposure.
To mitigate CVE-2018-1306, it is recommended to upgrade to a patched version of Apache Pluto beyond 3.0.0.
CVE-2018-1306 can be exploited by remote attackers to access sensitive information through improper file upload handling.
CVE-2018-1306 specifically affects Apache Pluto version 3.0.0.
Currently, the best approach for CVE-2018-1306 is to upgrade to a secure version, as specific workarounds are not provided.