Exposure of Sensitive Information in Apache Pluto
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
= 3.0.0
Patched versions
3.0.1
Description
Published by the National Vulnerability Database
Jun 27, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 3, 2022
Last updated
Feb 1, 2023
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
References