Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB4F4992-DAD4-43E4-A2D0-A00D585A2D31", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEB18D96-BB77-4C80-9534-F78B95687CEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D8A6B18-29FE-4194-8EFC-5543E1A46BC4", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B1FC971-D192-43D1-BD86-19E99ADF5C87", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A9BE413-E5A0-442F-B9B7-69F8EDD91FB8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "48203D48-8A45-4648-981A-F28BE13282B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E280C52A-2F26-4D14-B1E0-8FA25181E856", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "04574C35-A00D-49CC-8C50-301C7FC643F7", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A11BBF2D-4489-4111-98A1-AA0B89A15DC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "07D5A44B-5748-4AE4-9C8F-1718011961D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5BDE522-11D1-45AF-B60F-7F4022D85714", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "9039FCCF-740D-4320-BA11-BF9BCD7809CB", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "979685AE-AFA1-47A0-BC5E-BC06EFCF02DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9DD08D54-5FA6-4E2D-8264-1FE8907D756A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:gopivotal:grails:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2B5FC64-83CC-49D3-BFDD-494763AB1FEE", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EE1BBB9C-39B5-40CB-A12C-E33B7E35CB18", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6581AEB4-7049-4D84-9FB2-F5B58096BC60", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "23CF1A57-C941-4198-8F18-5618D8C07DD6", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "44DAA96C-1916-4100-8936-4353A3DC26A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "29342858-3173-45A5-91BF-81689593C960", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FAF7A322-5AE4-450C-B939-4D6B448766D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4ACEC5A6-FE19-423E-BF40-B5574C648A99", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "38C46B0E-3D30-4D22-9DF4-161FA5DE773D", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "828398A1-EF0C-4193-8D85-A91475162BFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AEC8808-6358-4D4F-8984-8D2A341D67E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7391B773-22CC-43D1-9848-F1DA14537049", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "446CEA94-E3B0-45A8-B491-EF7F1EA4D74D", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F330DB8-2576-44F1-A10C-7E3985FDFF9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6BF47B6-6338-4A4B-B7B2-BB83F5D2431A", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "63AF2815-41F3-499D-9BFC-086C623D285C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "D085E87C-4447-465E-9E35-F1BDE7E5C78D", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8DF5075-D458-4C50-99B7-CFFEEFFECBE3", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3C2CACE-22AD-4BA1-BEF7-6C9BE89E2851", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA1D4E9B-A698-4908-BFD8-E50F5F7989A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "14D06FBE-3BAB-4628-B702-F34FBDC5C36C", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5AC40D1E-2A40-4477-AC8D-712437CDD034", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "9148299E-E783-4508-BC5C-6A269A1944C5", "vulnerable": true}, {"criteria": "cpe:2.3:a:gopivotal:grails:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "6F4E1C85-2EE7-405B-B3EF-54B0B37E8624", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto del plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 no restringe debidamente acceso a archivos en el directorio META-INF, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud directa. NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 debido a investigadores diferentes por ADT5."}], "id": "CVE-2014-2857", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-04-15T23:55:08.720", "references": [{"source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.gopivotal.com/security/cve-2014-0053"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.gopivotal.com/security/cve-2014-0053"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}