Miggo Logo

CVE-2014-7816: Improper Limitation of a Pathname to a Restricted Directory in JBoss Undertow

5

CVSS Score

Basic Information

EPSS Score
0.97873%
Published
5/17/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
io.undertow:undertow-coremaven>= 1.0.0, < 1.0.171.0.17
io.undertow:undertow-coremaven>= 1.1.0.Beta1, <= 1.1.0.CR41.1.0.CR5
io.undertow:undertow-coremaven>= 1.2.0.Beta1, <= 1.2.0.Beta21.2.0.Beta3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper path handling on Windows systems. The patches add explicit checks for system path separators in three critical locations:

  1. ResourceHandler's serveResource - Directly processes resource requests
  2. DefaultServlet's doGet - Handles static resource serving
  3. ServletPathMatches' findWelcomeFile - Processes welcome file resolution

In unpatched versions, these functions would process paths containing Windows-style backslashes without proper normalization, allowing attackers to bypass directory traversal protections using alternate path separators. The vulnerable functions are directly involved in processing user-supplied URIs and resource resolution, making them key runtime detection points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ir**tory tr*v*rs*l vuln*r**ility in J*oss Un**rtow *.*.x ***or* *.*.**, *.*.x ***or* *.*.*.*R*, *n* *.*.x ***or* *.*.*.**t**, w**n runnin* on Win*ows, *llows r*mot* *tt**k*rs to r*** *r*itr*ry *il*s vi* * .. (*ot *ot) in * r*sour** URI.

Reasoning

T** vuln*r**ility st*ms *rom improp*r p*t* **n*lin* on Win*ows syst*ms. T** p*t***s *** *xpli*it ****ks *or syst*m p*t* s*p*r*tors in t*r** *riti**l lo**tions: *. R*sour****n*l*r's s*rv*R*sour** - *ir**tly pro**ss*s r*sour** r*qu*sts *. ****ultS*rvl*