Payara Micro Community 5.2021.6 and below allows Directory Traversal.
References
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2022/Nov/11 - Exploit, Mailing List, Third Party Advisory | |
References | () https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/50371 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.payara.fish - Product, Vendor Advisory | |
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt - Exploit, Third Party Advisory |
Information
Published : 2021-09-23 15:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41381
Mitre link : CVE-2021-41381
CVE.ORG link : CVE-2021-41381
JSON object : View
Products Affected
payara
- micro_community
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')