Path Traversal Vulnerability in Apache Pluto 3.0.0
CVE-2018-1306
7.5HIGH
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 27 June 2018
Badges
👾 Exploit Exists🟡 Public PoC🟣 EPSS 91%
Summary
In Apache Pluto version 3.0.0, the Multipart Portlet war file code exhibits a flaw allowing remote attackers to exploit insufficient path data restrictions during file uploads. This weakness can lead to unauthorized access to sensitive configuration data and other critical information for attackers who manipulate upload processes.
Affected Version(s)
Apache Pluto 3.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
91% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved