CVE-2018-11789

When accessing the heron-ui webpage, people can modify the file paths outside of the current container to access any file on the host. Example woule be modifying the parameter path= to go to the directory you would like to view. i.e. ..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:heron:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:44

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/107430 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107430 - Third Party Advisory, VDB Entry
References () https://lists.apache.org/thread.html/5ea1a102d87a47c5912d745fa0d5dfa2830fc94099cbc30911f095b9%40%3Cdev.heron.apache.org%3E - () https://lists.apache.org/thread.html/5ea1a102d87a47c5912d745fa0d5dfa2830fc94099cbc30911f095b9%40%3Cdev.heron.apache.org%3E -

07 Nov 2023, 02:51

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/5ea1a102d87a47c5912d745fa0d5dfa2830fc94099cbc30911f095b9@%3Cdev.heron.apache.org%3E', 'name': '[heron-dev] 20190306 [CVE-2018-11789] Apache Incubator Heron file access vulnerability', 'tags': ['Exploit', 'Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/5ea1a102d87a47c5912d745fa0d5dfa2830fc94099cbc30911f095b9%40%3Cdev.heron.apache.org%3E -

Information

Published : 2019-03-21 16:00

Updated : 2024-11-21 03:44


NVD link : CVE-2018-11789

Mitre link : CVE-2018-11789

CVE.ORG link : CVE-2018-11789


JSON object : View

Products Affected

apache

  • heron
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')