First published: Wed Nov 15 2023(Updated: )
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.projectreactor.netty:reactor-netty-http | >=1.0.0<1.0.39 | 1.0.39 |
maven/io.projectreactor.netty:reactor-netty-http | >=1.1.0<1.1.13 | 1.1.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-xjhv-p3fv-x24r is high.
GHSA-xjhv-p3fv-x24r allows a malicious user to perform a directory traversal attack in Reactor Netty HTTP Server.
Versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39 of Reactor Netty HTTP Server are affected by GHSA-xjhv-p3fv-x24r.
To fix GHSA-xjhv-p3fv-x24r in Reactor Netty HTTP Server, update to version 1.1.13 or higher for 1.1.x series and version 1.0.39 or higher for 1.0.x series.
The Common Weakness Enumeration (CWE) ID for GHSA-xjhv-p3fv-x24r is CWE-22.