First published: Thu Feb 09 2023(Updated: )
### Summary When running vertx web applications that serve files using `StaticHandler` on Windows Operating Systems and Windows File Systems, if the mount point is a wildcard (`*`) then an attacker can exfiltrate any class path resource. ### Details When computing the relative path to locate the resource, in case of wildcards, the code: https://github.com/vert-x3/vertx-web/blob/62c0d66fa1c179ae6a4d57344631679a2b97e60f/vertx-web/src/main/java/io/vertx/ext/web/impl/Utils.java#L83 returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized `\` are not properly handled and an attacker can build a path that is valid within the classpath. ### PoC https://github.com/adrien-aubert-drovio/vertx-statichandler-windows-traversal-path-vulnerability
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.vertx:vertx-web | >=4.0.0<4.3.8 | 4.3.8 |
redhat/vertx-web | <4.3.8 | 4.3.8 |
Eclipse Vert.x-Web | >=4.0.0<4.3.8 | |
IBM Cloud Pak for Business Automation | <=V23.0.1 - V23.0.1-IF001 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF023 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF006 and later fixes V22.0.1 - V22.0.1-IF006 and later fixes V21.0.2 - V21.0.2-IF012 and later fixes V21.0.1 - V21.0.1-IF007 and later fixes V20.0.1 - V20.0.3 and later fixes V19.0.1 - V19.0.3 and later fixes V18.0.0 - V18.0.2 and later fixes |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24815 is a vulnerability found in Vert.X Web that allows an attacker to exfiltrate files when serving files using `StaticHandler` on Windows Operating Systems and Windows File Systems.
CVE-2023-24815 has a severity score of 5.3, which is considered medium.
CVE-2023-24815 affects Vert.x-Web version up to exclusive 4.3.8.
To fix CVE-2023-24815, update Vert.x-Web to version 4.3.8 or later.
You can find more information about CVE-2023-24815 on the CVE website, NVD website, GitHub security advisories, Red Hat Bugzilla, and Red Hat Errata.