Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3626

EPSS 0.98% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-3626

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Grails Resource Plugin often has to exchange URIs for resources with other internal components. Those other components will decode any URI passed to them. To protect against directory traversal the Grails Resource Plugin did the following: normalized the URI, checked the normalized URI did not step outside the appropriate root directory (e.g. the web application root), decoded the URI and checked that this did not introduce additional /../ (and similar) sequences. A bug was introduced where the Grails Resource Plugin before 1.2.13 returned the decoded version of the URI rather than the normalized version of the URI after the directory traversal check. This exposed a double decoding vulnerability. To address this issue, the Grails Resource Plugin now repeatedly decodes the URI up to three times or until decoding no longer changes the URI. If the decode limit of 3 is exceeded the URI is rejected. A side-effect of this is that the Grails Resource Plugin is unable to serve a resource that includes a '%' character in the full path to the resource. Not all environments are vulnerable because of the differences in URL resolving in different servlet containers. Applications deployed to Tomcat 8 and Jetty 9 were found not not be vulnerable, however applications deployed to JBoss EAP 6.3 / JBoss AS 7.4 and JBoss AS 7.1 were found to be vulnerable (other JBoss versions weren't tested). In certain cases JBoss returns JBoss specific vfs protocol urls from URL resolution methods (ClassLoader.getResources). The JBoss vfs URL protocol supports resolving any file on the filesystem. This made the directory traversal possible. There may be other containers, in addition to JBoss, on which this vulnerability is exposed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Pivotal Grails Resources插件路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Pivotal Grails是美国Pivotal Software公司的一套基于Groovy编程语言且用于快速开发Web应用的开源框架。Resource Plugin是其中的一个HTML资源管理插件。 Pivotal Grails Resources插件1.2.0版本至1.2.12版本中存在目录遍历漏洞。远程攻击者可利用该漏洞查看系统上的任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Dell EMCGrails by Pivotal Resources plugin versions 1.2.0 - 1.2.12. Earlier versions may also be affected but were not assessed -

II. Public POCs for CVE-2014-3626

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-3626

Please Login to view more intelligence information

Same Patch Batch · Dell EMC · 2018-03-19 · 7 CVEs total

CVE-2015-5350Pivotal Garden 安全漏洞
CVE-2018-1195Cloud Controller、cf-deployment和cf-release 安全漏洞
CVE-2018-1196Pivotal Spring Boot 安全漏洞
CVE-2018-1197Cloud Foundry Windows Stemcells 安全漏洞
CVE-2018-1218Dell EMC NetWorker 跨站脚本漏洞
CVE-2018-1221Pivotal Cloud Foundry cf-deployment 和routing-release 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-3626

No comments yet


Leave a comment