CVE-2023-46851

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46851
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46851.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-46851
Published
2023-11-07T09:15:07.313Z
Modified
2025-11-15T06:57:56.592171Z
Severity
  • 4.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution.

This issue affects Apache Allura from 1.0.1 through 1.15.0.

Users are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set "disableentrypoints.allura.importers = forge-tracker, forge-discussion" in your .ini config file.

References

Affected packages

Git / github.com/apache/allura

Affected ranges

Type
GIT
Repo
https://github.com/apache/allura
Events

Affected versions

asf_release_1.*

asf_release_1.0.1
asf_release_1.1.0
asf_release_1.2.0
asf_release_1.2.1
asf_release_1.3.0
asf_release_1.3.1
asf_release_1.3.2

rel/1.*

rel/1.0.1
rel/1.1.0
rel/1.10.0
rel/1.11.0
rel/1.11.1
rel/1.12.0
rel/1.13.0
rel/1.14.0
rel/1.15.0
rel/1.2.0
rel/1.2.1
rel/1.3.0
rel/1.3.1
rel/1.3.2
rel/1.4.0
rel/1.5.0
rel/1.6.0
rel/1.7.0
rel/1.8.0
rel/1.8.1
rel/1.9.0