Description
HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.
Remediation
References
https://github.com/gravitee-io/gravitee-api-management
https://medium.com/%40maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f
Related Vulnerabilities
CVE-2017-5637 Vulnerability in maven package org.apache.zookeeper:zookeeper
CVE-2023-41058 Vulnerability in npm package parse-server
CVE-2020-2184 Vulnerability in maven package org.jenkins-ci.plugins:cvs
CVE-2018-1002200 Vulnerability in maven package org.codehaus.plexus:plexus-archiver
CVE-2017-5929 Vulnerability in maven package ch.qos.logback:logback-access