First published: Fri Aug 30 2019(Updated: )
Directory Traversal in APIkit, HTTP connector, and OAuth2 Provider components in MuleSoft Mule Runtime 3.2.0 and higher released before August 1 2019, MuleSoft Mule Runtime 4.1.0 and higher released before August 1 2019, and all versions of MuleSoft API Gateway released before August 1 2019 allow remote attackers to read files accessible to the Mule process.
Credit: security@salesforce.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.mule.runtime:mule | >=3.0.0<=4.1.5 | |
MuleSoft API Gateway | ||
Wibu CodeMeter Runtime | >=3.2.0<=3.9.3 | |
Wibu CodeMeter Runtime | >=4.1.0<=4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15630 has a critical severity rating due to its potential to exploit directory traversal vulnerabilities in multiple MuleSoft components.
To fix CVE-2019-15630, upgrade to MuleSoft Mule Runtime version 4.1.6 or later, or 3.9.4 or later, depending on your current version.
CVE-2019-15630 affects MuleSoft Mule Runtime 3.2.0 and higher, any version of API Gateway, and MuleSoft Mule Runtime 4.1.0 and higher released before August 1, 2019.
CVE-2019-15630 involves directory traversal vulnerabilities that can potentially allow unauthorized access to files on the server.
Yes, CVE-2019-15630 can be exploited remotely, enabling attackers to access sensitive information on affected systems.