5
CVSSv2

CVE-2014-0053

Published: 15/04/2014 Updated: 09/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The default configuration of the Resources plugin 1.0.0 prior to 1.2.6 for Pivotal Grails 2.0.0 prior to 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote malicious users to obtain sensitive information via a direct request. NOTE: this identifier has been SPLIT due to different researchers and different vulnerability types. See CVE-2014-2857 for the META-INF variant and CVE-2014-2858 for the directory traversal.

Vulnerable Product Search on Vulmon Subscribe to Product

gopivotal grails-resources 1.1.0

gopivotal grails-resources 1.1.1

gopivotal grails-resources 1.2.2

gopivotal grails-resources 1.2.3

gopivotal grails-resources 1.1.2

gopivotal grails-resources 1.1.4

gopivotal grails-resources 1.2.4

gopivotal grails-resources 1.2.5

gopivotal grails-resources 1.0.0

gopivotal grails-resources 1.0.2

gopivotal grails-resources 1.2.0

gopivotal grails-resources 1.2.1

gopivotal grails-resources 1.1.5

gopivotal grails-resources 1.1.6

gopivotal grails 2.0.3

gopivotal grails 2.0.4

gopivotal grails 2.2.1

gopivotal grails 2.2.2

gopivotal grails 2.3.3

gopivotal grails 2.3.4

gopivotal grails 2.1.0

gopivotal grails 2.1.1

gopivotal grails 2.2.3

gopivotal grails 2.2.4

gopivotal grails 2.3.5

gopivotal grails 2.0.1

gopivotal grails 2.0.2

gopivotal grails 2.1.5

gopivotal grails 2.2.0

gopivotal grails 2.3.1

gopivotal grails 2.3.2

gopivotal grails 2.0.0

gopivotal grails 2.1.2

gopivotal grails 2.1.3

gopivotal grails 2.1.4

gopivotal grails 2.2.5

gopivotal grails 2.3.0