First published: Mon May 25 2015(Updated: )
A flaw was reported in the Undertow module of WildFly that leaks the source code of a JSP page when a trailing slash (/) is added to the end of its URL. This issue did not affect any versions of Red Hat JBoss Enterprise Application Platform because this flaw only affects the Undertow web module; JBoss EAP uses JBoss Web.
Affected Software | Affected Version | How to fix |
---|---|---|
WildFly |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1224787 is classified as a high-risk issue due to the potential exposure of sensitive JSP source code.
To fix REDHAT-BUG-1224787, it is recommended to update to the latest version of WildFly, which includes security patches addressing this vulnerability.
REDHAT-BUG-1224787 specifically affects the Undertow module of Red Hat WildFly when a trailing slash is added to the URL of a JSP page.
No, REDHAT-BUG-1224787 does not affect any versions of Red Hat JBoss Enterprise Application Platform.
REDHAT-BUG-1224787 is a code exposure vulnerability that can lead to unauthorized access to JSP source files.