Drools Workbench contains a path traversal vulnerability. The vulnerability allows a remote, authenticated attacker to bypass the directory restrictions and retrieve arbitrary files from the affected host.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2822.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2823.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2937.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2938.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/94566 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037406 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7041 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-09-10 16:29
Updated : 2024-11-21 02:57
NVD link : CVE-2016-7041
Mitre link : CVE-2016-7041
CVE.ORG link : CVE-2016-7041
JSON object : View
Products Affected
redhat
- jboss_drools
- jboss_brms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')