5
CVSSv2

CVE-2014-2857

Published: 15/04/2014 Updated: 09/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The default configuration of the Resources plugin 1.0.0 prior to 1.2.6 for Pivotal Grails 2.0.0 up to and including 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote malicious users to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.

Vulnerable Product Search on Vulmon Subscribe to Product

gopivotal grails-resources 1.0.2

gopivotal grails-resources 1.1.0

gopivotal grails-resources 1.2.1

gopivotal grails-resources 1.2.2

gopivotal grails-resources 1.1.1

gopivotal grails-resources 1.1.2

gopivotal grails-resources 1.2.3

gopivotal grails-resources 1.2.4

gopivotal grails-resources 1.0.0

gopivotal grails-resources 1.1.6

gopivotal grails-resources 1.2.0

gopivotal grails-resources 1.1.4

gopivotal grails-resources 1.1.5

gopivotal grails-resources 1.2.5

gopivotal grails 2.0.2

gopivotal grails 2.0.3

gopivotal grails 2.1.5

gopivotal grails 2.2.0

gopivotal grails 2.3.1

gopivotal grails 2.3.2

gopivotal grails 2.0.4

gopivotal grails 2.1.0

gopivotal grails 2.2.1

gopivotal grails 2.2.2

gopivotal grails 2.3.3

gopivotal grails 2.3.4

gopivotal grails 2.3.6

gopivotal grails 2.0.0

gopivotal grails 2.0.1

gopivotal grails 2.1.3

gopivotal grails 2.1.4

gopivotal grails 2.2.5

gopivotal grails 2.3.0

gopivotal grails 2.1.1

gopivotal grails 2.1.2

gopivotal grails 2.2.3

gopivotal grails 2.2.4

gopivotal grails 2.3.5