
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical directory traversal vulnerability was discovered in Reactor Netty HTTP Server, identified as CVE-2023-34062. The vulnerability affects versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39. The issue specifically impacts applications where Reactor Netty HTTP Server is configured to serve static resources, allowing malicious users to send specially crafted URLs that can lead to directory traversal attacks (Spring Advisory, Security Online).
The vulnerability is classified with a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The issue is categorized as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), allowing attackers to manipulate URLs in a way that can bypass security restrictions and traverse the filesystem of the vulnerable system (NVD).
The vulnerability could allow attackers to gain unauthorized access to sensitive files and potentially compromise affected systems. Successful exploitation may lead to access and theft of sensitive files, including configuration files and sensitive data (Security Online).
Users of affected versions should upgrade to the patched versions: Reactor Netty 1.1.x users should upgrade to version 1.1.13, while 1.0.x users should upgrade to version 1.0.39. No additional steps are necessary after applying the appropriate upgrade (Spring Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."