7.5
CVSSv3

CVE-2023-34062

Published: 15/11/2023 Updated: 21/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Reactor Netty HTTP Server, versions 1.1.x before 1.1.13 and versions 1.0.x before 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pivotal reactor netty

Vendor Advisories

Description<!---->A flaw was found in the Reactor Netty HTTP Server If the server is configured to serve static resources, an attacker can use a specially crafted URL that may allow unauthorized access to privileged data on the serverA flaw was found in the Reactor Netty HTTP Server If the server is configured to serve static resources, an attac ...

Github Repositories

Playing around with a tool for updating POM dependencies

pombump Programmatically manipulate maven (pomxml) dependencies Overview For easier patchability, add ways to selectively bump versions for dependencies The idea is just like gobump but for java Usage The idea is that there are some patches that should be applied to the upstream pomxml file You can specify these via --dependencies flag, or via --patch-file You can also u

Playing around with a tool for updating POM dependencies

pombump Programmatically manipulate maven (pomxml) dependencies Overview For easier patchability, add ways to selectively bump versions for dependencies The idea is just like gobump but for java Usage The idea is that there are some patches that should be applied to the upstream pomxml file You can specify these via --dependencies flag, or via --patch-file You can also u