CVE-2023-34062

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-34062
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34062.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-34062
Aliases
Related
Published
2023-11-15T10:15:07Z
Modified
2025-02-14T11:47:01.058719Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.

Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.

References

Affected packages

Git / github.com/reactor/reactor-netty

Affected ranges

Type
GIT
Repo
https://github.com/reactor/reactor-netty
Events

Affected versions

v0.*

v0.8.23.RELEASE
v0.9.14.RELEASE
v0.9.15.RELEASE
v0.9.16.RELEASE
v0.9.17.RELEASE
v0.9.18.RELEASE
v0.9.19.RELEASE
v0.9.20.RELEASE
v0.9.21.RELEASE
v0.9.22.RELEASE
v0.9.23.RELEASE
v0.9.24.RELEASE
v0.9.25.RELEASE

v1.*

v1.0.0
v1.0.1
v1.0.10
v1.0.11
v1.0.12
v1.0.13
v1.0.14
v1.0.15
v1.0.16
v1.0.17
v1.0.18
v1.0.19
v1.0.2
v1.0.20
v1.0.21
v1.0.22
v1.0.23
v1.0.24
v1.0.25
v1.0.26
v1.0.27
v1.0.28
v1.0.29
v1.0.3
v1.0.30
v1.0.31
v1.0.32
v1.0.33
v1.0.34
v1.0.35
v1.0.36
v1.0.37
v1.0.38
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.0.9