CVE-2015-3198: The Undertow module of WildFly allows source code disclosure
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.59447%
CWE
Published
5/17/2022
Updated
8/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.wildfly:wildfly-parent | maven | >= 8.1.0.Final, <= 9.0.0.CR1 | 9.0.0.CR2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Undertow's DefaultServlet not handling trailing slashes in JSP URLs. The fix (visible in WFLY-4595 and related PRs) added a path validation check in DefaultServlet.service()
to reject requests ending with '/'. The vulnerable versions lacked this check, allowing JSP source disclosure by appending '/' to URLs. This matches the CWE-200 exposure pattern and is confirmed by community analysis showing the added path.endsWith("/")
guard clause as the mitigation.