
Cloud Vulnerability DB
A community-led vulnerabilities database
Gravitee API Management before version 3.15.13 was found to contain a path traversal vulnerability through HTML injection. The vulnerability was initially discovered and patched in 2019, but the fix was not completely effective. A new patch was released in version 3.15.13 that successfully addresses the issue (GitHub Advisory, Gravitee Community).
The vulnerability exists in the Email service of Gravitee API Management, where anonymous users can exploit a combination of HTML injection and path traversal via the /management/users/register endpoint to read arbitrary files on the system (GitHub Gist).
The vulnerability allows unauthorized users to read arbitrary files on the system, potentially exposing sensitive information and configuration data (GitHub Gist).
Users should upgrade to Gravitee API Management version 3.15.13 or later to address this vulnerability. The patch in this version has been confirmed to effectively remove the security flaw (GitHub Gist).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."