CVE-2020-7647: path traversal in Jooby
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49757%
CWE
Published
5/13/2020
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
io.jooby:jooby | maven | < 2.8.2 | 2.8.2 |
org.jooby:jooby | maven | < 2.8.2 | 2.8.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The loader function
's fallback to classloader.getResource()
without path validation allowed accessing arbitrary classpath resources when files weren't found in the filesystem
directory. 2) Missing prefix validation in asset configuration
patterns enabled path traversal via URL encoding (e.g., %252f for ../). The patches added classpath
prefix checks in classpathLoader
and enforced security restrictions in setRoute()
, confirming these were the vulnerable areas.