[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-0053Date: (C)2014-04-16   (M)2023-12-22


The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0194.html
http://www.securityfocus.com/archive/1/531281/100/0/threaded
SECUNIA-56841
BID-65678
grails-cve20140053-info-disc(91270)
http://www.gopivotal.com/security/cve-2014-0053
https://twitter.com/Ramsharan065/status/434975409134792704

CPE    37
cpe:/a:gopivotal:grails-resources:1.0.2
cpe:/a:gopivotal:grails-resources:1.2.0
cpe:/a:gopivotal:grails-resources:1.1.1
cpe:/a:gopivotal:grails-resources:1.2.1
...
CWE    1
CWE-264

© SecPod Technologies