Description
HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.
Remediation
References
https://github.com/gravitee-io/gravitee-api-management
https://medium.com/%40maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f
Related Vulnerabilities
CVE-2020-35201 Vulnerability in maven package org.igniterealtime.openfire.plugins:bookmarks
CVE-2022-30973 Vulnerability in maven package org.apache.tika:tika
CVE-2018-3726 Vulnerability in npm package crud-file-server
CVE-2022-40955 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2016-10539 Vulnerability in maven package org.webjars.npm:negotiator