A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "9.0.0-alpha1"
}
],
"cpe": "cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:alpha1:*:*:*:*:*:*",
"source": "CPE_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0"
},
{
"last_affected": "9.0.0-beta1"
},
{
"last_affected": "9.0.0-beta2"
},
{
"last_affected": "9.0.0-cr1"
},
{
"last_affected": "9.0.0-cr2"
},
{
"last_affected": "9.0.1"
},
{
"last_affected": "9.0.2"
},
{
"last_affected": "10.0.0"
},
{
"last_affected": "10.0.0-alpha1"
},
{
"last_affected": "10.0.0-alpha2"
},
{
"last_affected": "10.0.0-alpha3"
},
{
"last_affected": "10.0.0-alpha4"
},
{
"last_affected": "10.0.0-alpha5"
},
{
"last_affected": "10.0.0-alpha6"
},
{
"last_affected": "10.0.0-beta1"
},
{
"last_affected": "10.0.0-beta2"
},
{
"last_affected": "10.0.0-cr1"
},
{
"last_affected": "10.0.0-cr2"
},
{
"last_affected": "10.0.0-cr3"
},
{
"last_affected": "10.0.0-cr4"
},
{
"last_affected": "10.0.0-cr5"
},
{
"last_affected": "10.1.0"
},
{
"last_affected": "10.1.0-cr1"
},
{
"last_affected": "11.0.0"
},
{
"last_affected": "11.0.0-alpha1"
},
{
"last_affected": "11.0.0-beta1"
},
{
"last_affected": "11.0.0-cr1"
},
{
"last_affected": "7.1.0"
}
],
"cpe": [
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:cr1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.0:cr2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:cr1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:cr2:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:cr3:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:cr4:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.0.0:cr5:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:10.1.0:cr1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_wildfly_application_server:11.0.0:cr1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD"
}