The default configuration of the Resources plugin 1.0.0 prior to 1.2.6 for Pivotal Grails 2.0.0 prior to 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote malicious users to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gopivotal grails-resources 1.1.0 |
||
gopivotal grails-resources 1.1.1 |
||
gopivotal grails-resources 1.2.2 |
||
gopivotal grails-resources 1.2.3 |
||
gopivotal grails-resources 1.1.2 |
||
gopivotal grails-resources 1.1.4 |
||
gopivotal grails-resources 1.2.4 |
||
gopivotal grails-resources 1.2.5 |
||
gopivotal grails-resources 1.0.0 |
||
gopivotal grails-resources 1.0.2 |
||
gopivotal grails-resources 1.2.0 |
||
gopivotal grails-resources 1.2.1 |
||
gopivotal grails-resources 1.1.5 |
||
gopivotal grails-resources 1.1.6 |
||
gopivotal grails 2.0.3 |
||
gopivotal grails 2.0.4 |
||
gopivotal grails 2.2.1 |
||
gopivotal grails 2.2.2 |
||
gopivotal grails 2.3.3 |
||
gopivotal grails 2.3.4 |
||
gopivotal grails 2.1.0 |
||
gopivotal grails 2.1.1 |
||
gopivotal grails 2.2.3 |
||
gopivotal grails 2.2.4 |
||
gopivotal grails 2.3.5 |
||
gopivotal grails 2.0.1 |
||
gopivotal grails 2.0.2 |
||
gopivotal grails 2.1.5 |
||
gopivotal grails 2.2.0 |
||
gopivotal grails 2.3.1 |
||
gopivotal grails 2.3.2 |
||
gopivotal grails 2.0.0 |
||
gopivotal grails 2.1.2 |
||
gopivotal grails 2.1.3 |
||
gopivotal grails 2.1.4 |
||
gopivotal grails 2.2.5 |
||
gopivotal grails 2.3.0 |