CVE-2019-15630

Directory Traversal in APIkit, HTTP connector, and OAuth2 Provider components in MuleSoft Mule Runtime 3.2.0 and higher released before August 1 2019, MuleSoft Mule Runtime 4.1.0 and higher released before August 1 2019, and all versions of MuleSoft API Gateway released before August 1 2019 allow remote attackers to read files accessible to the Mule process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mulesoft:api_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:mulesoft:mule_runtime:*:*:*:*:*:*:*:*
cpe:2.3:a:mulesoft:mule_runtime:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () https://help.salesforce.com/apex/HTViewSolution?urlname=CVE-2019-15630-Directory-Traversal-in-MuleSoft-Runtime&language=en_US - Third Party Advisory () https://help.salesforce.com/apex/HTViewSolution?urlname=CVE-2019-15630-Directory-Traversal-in-MuleSoft-Runtime&language=en_US - Third Party Advisory

Information

Published : 2019-08-30 17:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-15630

Mitre link : CVE-2019-15630

CVE.ORG link : CVE-2019-15630


JSON object : View

Products Affected

mulesoft

  • mule_runtime
  • api_gateway
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')