CVE-2018-10862: Improper Limitation of a Pathname to a Restricted Directory in WildFly
5.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54927%
CWE
Published
5/14/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.wildfly.core:wildfly-server | maven | <= 6.0.0.Alpha2 | 6.0.0.Alpha3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability manifests in the unzip method's handling of ZIP entry paths. The patch changes show:
- unzip() originally used targetDir.resolve(name) which doesn't prevent path traversal
- The fix replaces this with resolveSecurely() which adds validation
- resolveSecurely() itself was modified to ensure proper path containment checks Runtime exploitation would show these functions in the call stack when processing malicious WAR files, as they handle path resolution during archive extraction.