|
Message-ID: <CAMufup6J2t4fA1ffPKTqBJvSmqbJbdUxPtbcUS1faVU_NthnvQ@mail.gmail.com> Date: Tue, 26 Mar 2019 22:43:09 +0100 From: Juan Pablo Santos RodrÃguez <juanpablo@...che.org> To: oss-security@...ts.openwall.com Subject: [CVE-2019-0225] Apache JSPWiki Local File Inclusion (limited ROOT folder) vulnerability leads to user information disclosure [CVEID]:CVE-2019-0225 [PRODUCT]:Apache JSPWiki [VERSION]:Apache JSPWiki 2.9.0 to 2.11.0.M2 [PROBLEMTYPE]:Local File Inclusion (limited ROOT folder) vulnerability leads to user information disclosure [REFERENCES]:https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225 [DESCRIPTION]: A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki, which could be used by an attacker to obtain registered users' details.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.