CVE-2018-1000817:
Asset Pipeline Grails Plugin vulnerable to Path Traversal
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.61763%
CWE
Published
5/13/2022
Updated
2/2/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.grails.plugins:asset-pipeline | maven | < 2.14.1 | 2.14.1 |
org.grails.plugins:asset-pipeline | maven | = 2.15.0 | 2.15.1 |
org.grails.plugins:asset-pipeline | maven | >= 3.0.0, < 3.0.6 | 3.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path validation when handling asset requests. While no patch code is provided, the description explicitly states that specially crafted GET requests with directory traversal sequences in the asset-pipeline context lead to arbitrary file exposure. In Grails asset-pipeline architecture, the Filter->Service->ResourceLocator
chain is responsible for processing asset requests. The confidence is medium because we're inferring based on vulnerability patterns rather than explicit patch analysis. These functions represent the most probable locations where path traversal checks would be missing in vulnerable versions, given their role in request handling and resource resolution.