CVE-2014-2857CVE-2014-2857

Affected configuration(s):

cpe:/a:gopivotal:grails:2.0.0
cpe:/a:gopivotal:grails:2.0.1
cpe:/a:gopivotal:grails:2.0.2
cpe:/a:gopivotal:grails:2.0.3
cpe:/a:gopivotal:grails:2.0.4
cpe:/a:gopivotal:grails:2.1.0
cpe:/a:gopivotal:grails:2.1.1
cpe:/a:gopivotal:grails:2.1.2
cpe:/a:gopivotal:grails:2.1.3
cpe:/a:gopivotal:grails:2.1.4
cpe:/a:gopivotal:grails:2.1.5
cpe:/a:gopivotal:grails:2.2.0
cpe:/a:gopivotal:grails:2.2.1
cpe:/a:gopivotal:grails:2.2.2
cpe:/a:gopivotal:grails:2.2.3
cpe:/a:gopivotal:grails:2.2.4
cpe:/a:gopivotal:grails:2.2.5
cpe:/a:gopivotal:grails:2.3.0
cpe:/a:gopivotal:grails:2.3.1
cpe:/a:gopivotal:grails:2.3.2
cpe:/a:gopivotal:grails:2.3.3
cpe:/a:gopivotal:grails:2.3.4
cpe:/a:gopivotal:grails:2.3.5
cpe:/a:gopivotal:grails:2.3.6
cpe:/a:gopivotal:grails-resources:1.0.0
cpe:/a:gopivotal:grails-resources:1.0.2
cpe:/a:gopivotal:grails-resources:1.1.0
cpe:/a:gopivotal:grails-resources:1.1.1
cpe:/a:gopivotal:grails-resources:1.1.2
cpe:/a:gopivotal:grails-resources:1.1.4
cpe:/a:gopivotal:grails-resources:1.1.5
cpe:/a:gopivotal:grails-resources:1.1.6
cpe:/a:gopivotal:grails-resources:1.2.0
cpe:/a:gopivotal:grails-resources:1.2.1
cpe:/a:gopivotal:grails-resources:1.2.2
cpe:/a:gopivotal:grails-resources:1.2.3
cpe:/a:gopivotal:grails-resources:1.2.4
cpe:/a:gopivotal:grails-resources:1.2.5

Date published: 2014-04-15T19:55:08.720-04:00

Date last modified: 2014-04-22T13:54:17.127-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html

Summary: The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.