It was found that paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. Upstream bug: https://jira.spring.io/browse/SPR-14946 Upstream patches: https://github.com/spring-projects/spring-framework/commit/e2d6e709c3c65a4951eb096843ee75d5200cfcad https://github.com/spring-projects/spring-framework/commit/43bf008fbcd0d7945e2fcd5e30039bc4d74c7a98 https://github.com/spring-projects/spring-framework/commit/a7dc48534ea501525f11369d369178a60c2f47d0 External References: https://pivotal.io/security/cve-2016-9878
Created springframework tracking bugs for this issue: Affects: fedora-all [bug 1408165]
Could not find any uses for ResourceServlet in Red Hat Mobile Application Platform. Marking as not affected.
EAP 5 is in Extended Life Support phase, so we won't fix this moderate issue on that product.
This issue has been addressed in the following products: Red Hat JBoss Fuse Via RHSA-2017:3115 https://access.redhat.com/errata/RHSA-2017:3115