FKIE_CVE-2014-2857
Vulnerability from fkie_nvd - Published: 2014-04-15 23:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB4F4992-DAD4-43E4-A2D0-A00D585A2D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEB18D96-BB77-4C80-9534-F78B95687CEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3D8A6B18-29FE-4194-8EFC-5543E1A46BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B1FC971-D192-43D1-BD86-19E99ADF5C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9BE413-E5A0-442F-B9B7-69F8EDD91FB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48203D48-8A45-4648-981A-F28BE13282B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E280C52A-2F26-4D14-B1E0-8FA25181E856",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "04574C35-A00D-49CC-8C50-301C7FC643F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A11BBF2D-4489-4111-98A1-AA0B89A15DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07D5A44B-5748-4AE4-9C8F-1718011961D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5BDE522-11D1-45AF-B60F-7F4022D85714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9039FCCF-740D-4320-BA11-BF9BCD7809CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "979685AE-AFA1-47A0-BC5E-BC06EFCF02DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD08D54-5FA6-4E2D-8264-1FE8907D756A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B5FC64-83CC-49D3-BFDD-494763AB1FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE1BBB9C-39B5-40CB-A12C-E33B7E35CB18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6581AEB4-7049-4D84-9FB2-F5B58096BC60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "23CF1A57-C941-4198-8F18-5618D8C07DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "44DAA96C-1916-4100-8936-4353A3DC26A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "29342858-3173-45A5-91BF-81689593C960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF7A322-5AE4-450C-B939-4D6B448766D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACEC5A6-FE19-423E-BF40-B5574C648A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "38C46B0E-3D30-4D22-9DF4-161FA5DE773D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "828398A1-EF0C-4193-8D85-A91475162BFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5AEC8808-6358-4D4F-8984-8D2A341D67E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7391B773-22CC-43D1-9848-F1DA14537049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "446CEA94-E3B0-45A8-B491-EF7F1EA4D74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F330DB8-2576-44F1-A10C-7E3985FDFF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BF47B6-6338-4A4B-B7B2-BB83F5D2431A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF2815-41F3-499D-9BFC-086C623D285C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D085E87C-4447-465E-9E35-F1BDE7E5C78D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DF5075-D458-4C50-99B7-CFFEEFFECBE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3C2CACE-22AD-4BA1-BEF7-6C9BE89E2851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1D4E9B-A698-4908-BFD8-E50F5F7989A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "14D06FBE-3BAB-4628-B702-F34FBDC5C36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC40D1E-2A40-4477-AC8D-712437CDD034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9148299E-E783-4508-BC5C-6A269A1944C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gopivotal:grails:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6F4E1C85-2EE7-405B-B3EF-54B0B37E8624",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5."
},
{
"lang": "es",
"value": "La configuraci\u00f3n por defecto del plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 no restringe debidamente acceso a archivos en el directorio META-INF, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud directa. NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 debido a investigadores diferentes por ADT5."
}
],
"id": "CVE-2014-2857",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-04-15T23:55:08.720",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.gopivotal.com/security/cve-2014-0053"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.gopivotal.com/security/cve-2014-0053"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…