First published: Wed Nov 15 2023(Updated: )
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Reactor Netty | >=1.0.0<1.0.39 | |
Pivotal Reactor Netty | >=1.1.0<1.1.13 | |
maven/io.projectreactor.netty:reactor-netty-http | >=1.0.0<1.0.39 | 1.0.39 |
maven/io.projectreactor.netty:reactor-netty-http | >=1.1.0<1.1.13 | 1.1.13 |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-34062.
The severity of CVE-2023-34062 is high, with a severity value of 7.5.
Reactor Netty HTTP Server versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39 are affected by CVE-2023-34062.
A malicious user can exploit CVE-2023-34062 by sending a request with a specially crafted URL that leads to a directory traversal attack.
You can find more information about CVE-2023-34062 on the following sources: [Spring](https://spring.io/security/cve-2023-34062), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-34062), [GitHub Advisories](https://github.com/advisories/GHSA-xjhv-p3fv-x24r).