Vulnerability Description
Directory Traversal in APIkit, HTTP connector, and OAuth2 Provider components in MuleSoft Mule Runtime 3.2.0 and higher released before August 1 2019, MuleSoft Mule Runtime 4.1.0 and higher released before August 1 2019, and all versions of MuleSoft API Gateway released before August 1 2019 allow remote attackers to read files accessible to the Mule process.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mulesoft | Api Gateway | All versions |
| Mulesoft | Mule Runtime | >= 3.2.0, <= 3.9.3 |
Related Weaknesses (CWE)
References
- https://help.salesforce.com/apex/HTViewSolution?urlname=CVE-2019-15630-DirectoryThird Party Advisory
- https://help.salesforce.com/apex/HTViewSolution?urlname=CVE-2019-15630-DirectoryThird Party Advisory
FAQ
What is CVE-2019-15630?
CVE-2019-15630 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory Traversal in APIkit, HTTP connector, and OAuth2 Provider components in MuleSoft Mule Runtime 3.2.0 and higher released before August 1 2019, MuleSoft Mule Runtime 4.1.0 and higher released b...
How severe is CVE-2019-15630?
CVE-2019-15630 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15630?
Check the references section above for vendor advisories and patch information. Affected products include: Mulesoft Api Gateway, Mulesoft Mule Runtime.