Headline
CVE-2023-34062: CVE-2023-34062: Directory Traversal in Reactor Netty HTTP Server
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Description
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Affected Spring Products and Versions
- Reactor Netty
- 1.1.0 to 1.1.12
- 1.0.0 to 1.0.38
- And older unsupported versions
Mitigation
Users of affected versions should apply the following mitigation. 1.1.x users should upgrade to 1.1.13. 1.0.x users should upgrade to 1.0.39. No other steps are necessary. Releases that have fixed this issue include:
- Reactor Netty
- 1.1.13
- 1.0.39
Credit
The issue was identified and responsibly reported by i. A. Dr. Michael Ummels from BVU Beratergruppe Verkehr + Umwelt GmbH
References
- https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1
History
- 2023-11-15: Initial vulnerability report published.
Related news
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.