CVE-2021-41381 Scanner
Detects 'Directory Traversal' vulnerability in Payara Micro Community affects v. 5.2021.6.
Short Info
Level
High
Type
Single Scan
Can be used by
Asset Owner
Estimated Time
10 sec
Scan only one
Url
Parent Category
CVE-2021-41381 Scanner Detail
Payara Micro Community is a compact, lightweight, yet sturdy platform that was built for Java EE and Jakarta EE applications. It is often used to process and manage microservices and other lightweight service-based architectures. Since the framework is modular and lightweight, it can be used for application build and deployment in a variety of environments such as cloud, Docker, and Kubernetes.
CVE-2021-41381 is a recently discovered vulnerability that affects Payara Micro Community versions 5.2021.6 and earlier. This vulnerability gives hackers the ability to perform file directory traversal. It allows them to navigate through file directories that should normally be inaccessible to them. Directory traversal makes it possible for hackers to browse unauthorized files, read sensitive information, or even install malware.
When hackers exploit CVE-2021-41381, they put businesses and organizations at risk. The vulnerability allows unauthorized access to sensitive data, which can lead to the theft of customers' personal information, credit card data, or even corporate intellectual property.
Thanks to the pro features of securityforeveryone.com, businesses and organizations can quickly and easily learn about vulnerabilities in their digital assets. With its comprehensive database and real-time alerts, securityforeveryone.com provides valuable insights and guidance that help businesses reduce the risk of cyber attacks. By subscribing to the platform, businesses can stay ahead of the curve and protect their digital assets from the latest security threats.
REFERENCES
- http://packetstormsecurity.com/files/164365/Payara-Micro-Community-5.2021.6-Directory-Traversal.html
- https://github.com/Net-hunter121/CVE-2021-41381/blob/main/CVE:%202021-41381-POC
- https://www.exploit-db.com/exploits/50371
- https://www.payara.fish
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-054.txt
control security posture