{"id":"CVE-2018-1299","details":"In Apache Allura before 1.8.0, unauthenticated attackers may retrieve arbitrary files through the Allura web application. Some webservers used with Allura, such as Nginx, Apache/mod_wsgi or paster may prevent the attack from succeeding. Others, such as gunicorn do not prevent it and leave Allura vulnerable.","modified":"2026-03-14T09:27:39.063219Z","published":"2018-02-06T20:29:00.253Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/b52069073cf3cb0f84c9e1e2b34d411fc163af39e4f3e50712ac8a4d%40%3Cdev.allura.apache.org%3E"},{"type":"ADVISORY","url":"https://allura.apache.org/posts/2018-allura-1.8.0.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/allura","events":[{"introduced":"0"},{"fixed":"daefc6a7320c80a08d05cf4ae4b8a7338ad9a2c9"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.8.0"}]}}],"versions":["allura_20110215","allura_20110218","allura_20110218.01","allura_20110223","allura_20110228","allura_20110316.01","asf_release_1.0.0","asf_release_1.0.0-RC1","asf_release_1.0.1","asf_release_1.1.0","asf_release_1.2.0","asf_release_1.2.1","asf_release_1.3.0","asf_release_1.3.1","asf_release_1.3.2","rel/1.0.0","rel/1.0.1","rel/1.1.0","rel/1.2.0","rel/1.2.1","rel/1.3.0","rel/1.3.1","rel/1.3.2","rel/1.4.0","rel/1.5.0","rel/1.6.0","rel/1.7.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1299.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}