FKIE_CVE-2014-2857

Vulnerability from fkie_nvd - Published: 2014-04-15 23:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request. NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB4F4992-DAD4-43E4-A2D0-A00D585A2D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEB18D96-BB77-4C80-9534-F78B95687CEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D8A6B18-29FE-4194-8EFC-5543E1A46BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1FC971-D192-43D1-BD86-19E99ADF5C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9BE413-E5A0-442F-B9B7-69F8EDD91FB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "48203D48-8A45-4648-981A-F28BE13282B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E280C52A-2F26-4D14-B1E0-8FA25181E856",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "04574C35-A00D-49CC-8C50-301C7FC643F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11BBF2D-4489-4111-98A1-AA0B89A15DC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D5A44B-5748-4AE4-9C8F-1718011961D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5BDE522-11D1-45AF-B60F-7F4022D85714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9039FCCF-740D-4320-BA11-BF9BCD7809CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "979685AE-AFA1-47A0-BC5E-BC06EFCF02DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails-resources:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD08D54-5FA6-4E2D-8264-1FE8907D756A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B5FC64-83CC-49D3-BFDD-494763AB1FEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE1BBB9C-39B5-40CB-A12C-E33B7E35CB18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6581AEB4-7049-4D84-9FB2-F5B58096BC60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CF1A57-C941-4198-8F18-5618D8C07DD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "44DAA96C-1916-4100-8936-4353A3DC26A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "29342858-3173-45A5-91BF-81689593C960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF7A322-5AE4-450C-B939-4D6B448766D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ACEC5A6-FE19-423E-BF40-B5574C648A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C46B0E-3D30-4D22-9DF4-161FA5DE773D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "828398A1-EF0C-4193-8D85-A91475162BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AEC8808-6358-4D4F-8984-8D2A341D67E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7391B773-22CC-43D1-9848-F1DA14537049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "446CEA94-E3B0-45A8-B491-EF7F1EA4D74D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F330DB8-2576-44F1-A10C-7E3985FDFF9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BF47B6-6338-4A4B-B7B2-BB83F5D2431A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF2815-41F3-499D-9BFC-086C623D285C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D085E87C-4447-465E-9E35-F1BDE7E5C78D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8DF5075-D458-4C50-99B7-CFFEEFFECBE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C2CACE-22AD-4BA1-BEF7-6C9BE89E2851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1D4E9B-A698-4908-BFD8-E50F5F7989A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "14D06FBE-3BAB-4628-B702-F34FBDC5C36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC40D1E-2A40-4477-AC8D-712437CDD034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9148299E-E783-4508-BC5C-6A269A1944C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gopivotal:grails:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F4E1C85-2EE7-405B-B3EF-54B0B37E8624",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request.  NOTE: this issue was SPLIT from CVE-2014-0053 due to different researchers per ADT5."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n por defecto del plugin Resources 1.0.0 anterior a 1.2.6 para Pivotal Grails 2.0.0 hasta 2.3.6 no restringe debidamente acceso a archivos en el directorio META-INF, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud directa.  NOTA: este problema fue dividido (SPLIT) de CVE-2014-0053 debido a investigadores diferentes por ADT5."
    }
  ],
  "id": "CVE-2014-2857",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-04-15T23:55:08.720",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.gopivotal.com/security/cve-2014-0053"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2014-02/0267.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.gopivotal.com/security/cve-2014-0053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/531281/100/0/threaded"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…