HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.
References
Link | Resource |
---|---|
https://github.com/gravitee-io/gravitee-api-management | Product Third Party Advisory |
https://medium.com/@maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-08-22 18:15
Updated : 2022-08-25 11:22
NVD link : CVE-2019-25075
Mitre link : CVE-2019-25075
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
gravitee
- api_management