First published: Wed Nov 15 2023(Updated: )
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Credit: firstname.lastname@example.org email@example.com
|Affected Software||Affected Version||How to fix|
|Pivotal Reactor Netty||>=1.0.0<1.0.39|
|Pivotal Reactor Netty||>=1.1.0<1.1.13|
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the vulnerability ID for this issue?
The vulnerability ID for this issue is CVE-2023-34062.
What is the severity of CVE-2023-34062?
The severity of CVE-2023-34062 is high, with a severity value of 7.5.
Which versions of Reactor Netty HTTP Server are affected by CVE-2023-34062?
Reactor Netty HTTP Server versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39 are affected by CVE-2023-34062.
How can a malicious user exploit CVE-2023-34062?
A malicious user can exploit CVE-2023-34062 by sending a request with a specially crafted URL that leads to a directory traversal attack.
Where can I find more information about CVE-2023-34062?
You can find more information about CVE-2023-34062 on the following sources: [Spring](https://spring.io/security/cve-2023-34062), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-34062), [GitHub Advisories](https://github.com/advisories/GHSA-xjhv-p3fv-x24r).
- product/reactor netty
- canonical/pivotal reactor netty
SecAlerts Pty Ltd.
132 Wickham Terrace
QLD 4006, Australiainfo@secalerts.co
© 2023 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203