io.vertx:vertx-web@4.3.6 vulnerabilities

  • latest version

    5.0.4

  • first published

    10 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the io.vertx:vertx-web package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Files or Directories Accessible to External Parties

    io.vertx:vertx-web is a HTTP web applications for Vert.x.

    Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties via improper handling of hidden directories in the StaticHandler implementation when the setIncludeHidden(false) configuration is set. An attacker can access sensitive files within hidden directories by directly requesting their paths, potentially exposing confidential information like credentials, configuration files, or source code.

    How to fix Files or Directories Accessible to External Parties?

    Upgrade io.vertx:vertx-web to version 4.5.22, 5.0.5 or higher.

    [,4.5.22)[5.0.0.CR1,5.0.5)
    • L
    Cross-site Scripting (XSS)

    io.vertx:vertx-web is a HTTP web applications for Vert.x.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the sendDirectoryListing in StaticHandlerImpl.java. An attacker can execute arbitrary JavaScript in the browser context of users viewing the directory listing page by creating files with specially crafted names that are rendered without proper HTML escaping.

    Notes:

    • Successful exploitation requires directory listing to be enabled using StaticHandler (e.g., StaticHandler.create("public").setDirectoryListing(true))
    • The attacker requires the ability to create arbitrary file names under a public directory (e.g., via upload functionality or a shared directory)

    How to fix Cross-site Scripting (XSS)?

    Upgrade io.vertx:vertx-web to version 4.5.22, 5.0.5 or higher.

    [,4.5.22)[5.0.0.CR1,5.0.5)
    • M
    Directory Traversal

    io.vertx:vertx-web is a HTTP web applications for Vert.x.

    Affected versions of this package are vulnerable to Directory Traversal when running Vertx web applications that serve files using StaticHandle. If the mount point is a wildcard (*) then an attacker can exfiltrate any class path resource.

    When computing the relative path to locate the resource, in case of wildcards, the code returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized, \ are not properly handled and an attacker can build a path that is valid within the classpath.

    Note: This vulnerability can only be exploited on Windows Operating Systems and Windows File Systems

    How to fix Directory Traversal?

    Upgrade io.vertx:vertx-web to version 4.3.8 or higher.

    [4.0.0,4.3.8)