First published: Thu Mar 28 2019(Updated: )
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache JSPWiki | >=2.9.0<2.11.0 | |
Apache JSPWiki | =2.11.0 | |
Apache JSPWiki | =2.11.0-milestone1-rc1 | |
Apache JSPWiki | =2.11.0-milestone1-rc2 | |
Apache JSPWiki | =2.11.0-milestone1-rc3 | |
Apache JSPWiki | =2.11.0-milestone2 | |
Apache JSPWiki | =2.11.0-milestone2-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0225 is a vulnerability that allows an attacker to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, potentially exposing registered users' details.
CVE-2019-0225 has a severity rating of 7.5, which is considered high.
CVE-2019-0225 allows an attacker to exploit a specially crafted URL to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, potentially exposing users' details.
An attacker can exploit CVE-2019-0225 by using a specially crafted URL to access files under the ROOT directory of the Apache JSPWiki application.
To protect your Apache JSPWiki application from CVE-2019-0225, it is recommended to update to a version higher than 2.11.0.M2.