Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAMufup6J2t4fA1ffPKTqBJvSmqbJbdUxPtbcUS1faVU_NthnvQ@mail.gmail.com>
Date: Tue, 26 Mar 2019 22:43:09 +0100
From: Juan Pablo Santos Rodríguez <juanpablo@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2019-0225] Apache JSPWiki Local File Inclusion (limited ROOT
 folder) vulnerability leads to user information disclosure

[CVEID]:CVE-2019-0225
[PRODUCT]:Apache JSPWiki
[VERSION]:Apache JSPWiki 2.9.0 to 2.11.0.M2
[PROBLEMTYPE]:Local File Inclusion (limited ROOT folder) vulnerability
leads to user information disclosure
[REFERENCES]:https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225
[DESCRIPTION]: A specially crafted url could be used to access files under
the ROOT directory of the application on Apache JSPWiki, which could be
used by an attacker to obtain registered users' details.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.