A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 22 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 21 Aug 2024 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
References |
|
Tue, 20 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9 |

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-11-23T03:33:41.193Z
Reserved: 2024-02-12T20:12:13.991Z
Link: CVE-2024-1459

Updated: 2024-11-22T12:04:46.762Z

Status : Modified
Published: 2024-02-12T21:15:08.533
Modified: 2024-11-22T12:15:18.250
Link: CVE-2024-1459
