Description
The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.
Remediation
References
http://portals.apache.org/pluto/security.html
https://www.exploit-db.com/exploits/45396/
Related Vulnerabilities
CVE-2023-24437 Vulnerability in maven package org.jenkins-ci.plugins:jira-steps
CVE-2023-28155 Vulnerability in npm package request
CVE-2020-2218 Vulnerability in maven package org.jenkins-ci.plugins:hp-quality-center
CVE-2022-2390 Vulnerability in maven package com.google.android.gms:play-services-basement