Vulnerability Description
The Undertow module of WildFly 9.x before 9.0.0.CR2 and 10.x before 10.0.0.Alpha1 allows remote attackers to obtain the source code of a JSP page via a "/" at the end of a URL.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Jboss Wildfly Application Server | 9.0.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1224787Issue TrackingThird Party Advisory
- https://developer.jboss.org/message/927301#927301Issue TrackingThird Party Advisory
- https://issues.jboss.org/browse/WFLY-4595Third Party Advisory
- https://stackoverflow.com/questions/30028346/with-trailing-slash-in-url-jsp-showThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1224787Issue TrackingThird Party Advisory
- https://developer.jboss.org/message/927301#927301Issue TrackingThird Party Advisory
- https://issues.jboss.org/browse/WFLY-4595Third Party Advisory
- https://stackoverflow.com/questions/30028346/with-trailing-slash-in-url-jsp-showThird Party Advisory
FAQ
What is CVE-2015-3198?
CVE-2015-3198 is a vulnerability with a CVSS score of 7.5 (HIGH). The Undertow module of WildFly 9.x before 9.0.0.CR2 and 10.x before 10.0.0.Alpha1 allows remote attackers to obtain the source code of a JSP page via a "/" at the end of a URL.
How severe is CVE-2015-3198?
CVE-2015-3198 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3198?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Jboss Wildfly Application Server.