CVE-2018-1306

The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
References
Link Resource
http://portals.apache.org/pluto/security.html Mitigation Vendor Advisory
https://www.exploit-db.com/exploits/45396/ Exploit Third Party Advisory VDB Entry
http://portals.apache.org/pluto/security.html Mitigation Vendor Advisory
https://www.exploit-db.com/exploits/45396/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:pluto:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () http://portals.apache.org/pluto/security.html - Mitigation, Vendor Advisory () http://portals.apache.org/pluto/security.html - Mitigation, Vendor Advisory
References () https://www.exploit-db.com/exploits/45396/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45396/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-06-27 18:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1306

Mitre link : CVE-2018-1306

CVE.ORG link : CVE-2018-1306


JSON object : View

Products Affected

apache

  • pluto
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor