First published: Fri Jul 16 2021(Updated: )
Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Objectcomputing Micronaut | <2.5.9 |
https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Micronaut vulnerability is CVE-2021-32769.
Micronaut is a JVM-based, full stack Java framework designed for building JVM applications.
The severity of CVE-2021-32769 is high with a severity value of 7.5.
The path traversal vulnerability in Micronaut occurs because it is possible to access any file from a filesystem using "/../../" in the URL.
To fix the path traversal vulnerability in Micronaut, you should update to version 2.5.9 or later.