CVE-2020-6950

Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_calculation_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:solaris_cluster:4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:time_and_labor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943 - Issue Tracking, Vendor Advisory () https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943 - Issue Tracking, Vendor Advisory
References () https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741 - Patch, Third Party Advisory () https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741 - Patch, Third Party Advisory
References () https://github.com/eclipse-ee4j/mojarra/issues/4571 - Issue Tracking, Third Party Advisory () https://github.com/eclipse-ee4j/mojarra/issues/4571 - Issue Tracking, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory

Information

Published : 2021-06-02 16:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6950

Mitre link : CVE-2020-6950

CVE.ORG link : CVE-2020-6950


JSON object : View

Products Affected

oracle

  • banking_enterprise_default_management
  • hyperion_calculation_manager
  • solaris_cluster
  • communications_network_integrity
  • communications_pricing_design_center
  • time_and_labor
  • banking_platform
  • retail_merchandising_system

eclipse

  • mojarra
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')