Description
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
Remediation
References
https://spring.io/security/cve-2023-34062
Related Vulnerabilities
CVE-2023-37945 Vulnerability in maven package io.jenkins.plugins:miniorange-saml-sp
CVE-2023-41037 Vulnerability in maven package org.webjars.npm:openpgp
CVE-2020-2283 Vulnerability in maven package org.jenkins-ci.plugins:liquibase-runner
CVE-2020-10686 Vulnerability in maven package org.keycloak:keycloak-model-jpa
CVE-2020-1724 Vulnerability in maven package org.keycloak:keycloak-services