Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jboss.eap/wildfly-undertow
  4. ›
  5. CVE-2018-1048

CVE-2018-1048: Improper Encoding or Escaping of Output

May 13, 2022 (updated June 30, 2022)

It was found that the AJP connector in undertow, as shipped in Jboss EAP 7.1.0.GA, does not use the ALLOW_ENCODED_SLASH option and thus allow the the slash / anti-slash characters encoded in the url which may lead to path traversal and result in the information disclosure of arbitrary local files.

References

  • access.redhat.com/errata/RHSA-2018:0478
  • access.redhat.com/errata/RHSA-2018:0479
  • access.redhat.com/errata/RHSA-2018:0480
  • access.redhat.com/errata/RHSA-2018:0481
  • bugzilla.redhat.com/show_bug.cgi?id=1534343
  • github.com/advisories/GHSA-prfw-3qx6-g9xr
  • nvd.nist.gov/vuln/detail/CVE-2018-1048

Code Behaviors & Features

Detect and mitigate CVE-2018-1048 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

Version 7.1.0.ga

Fixed versions

  • 7.1.1.GA

Solution

Upgrade to version 7.1.1.GA or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-116: Improper Encoding or Escaping of Output
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

maven/org.jboss.eap/wildfly-undertow/CVE-2018-1048.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.