Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2020-6950
Severity
6.5MEDIUM
EPSS
51.7%
top 2.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 2
Latest updateApr 15
Description
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6
Affected Packages11 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
Eclipse Mojarra - Local File Read
📋Vendor Advisories
8Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: Third Party (Eclipse Mojarra) — CVE-2020-6950↗2023-04-15
Oracle
▶
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: Installer (Eclipse Mojarra) — CVE-2020-6950↗2022-04-15
Oracle
▶
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: Services Manager (Eclipse Mojarra) — CVE-2020-6950↗2021-10-15
💬Community
1Bugzilla▶
CVE-2020-6950 Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371↗2020-02-20