{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T21:10:18.581","vulnerabilities":[{"cve":{"id":"CVE-2023-46851","sourceIdentifier":"security@apache.org","published":"2023-11-07T09:15:07.313","lastModified":"2024-11-21T08:29:25.597","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Allura Discussion and Allura Forum importing does not restrict URL values specified in attachments. Project administrators can run these imports, which could cause Allura to read local files and expose them.  Exposing internal files then can lead to other exploits, like session hijacking, or remote code execution.\n\nThis issue affects Apache Allura from 1.0.1 through 1.15.0.\n\nUsers are recommended to upgrade to version 1.16.0, which fixes the issue.  If you are unable to upgrade, set \"disable_entry_points.allura.importers = forge-tracker, forge-discussion\" in your .ini config file.\n\n"},{"lang":"es","value":"La importación de Allura Discussion y Allura Forum no restringe los valores de URL especificados en los archivos adjuntos. Los administradores de proyectos pueden ejecutar estas importaciones, lo que podría hacer que Allura lea archivos locales y los exponga. La exposición de archivos internos puede dar lugar a otros exploits, como el secuestro de sesión o la ejecución remota de código. Este problema afecta a Apache Allura desde la versión 1.0.1 hasta la 1.15.0. Se recomienda a los usuarios actualizar a la versión 1.16.0, que soluciona el problema. Si no puede actualizar, configure \"disable_entry_points.allura.importers = forge-tracker, forge-discussion\" en su archivo de configuración .ini."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-73"},{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:allura:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.1","versionEndExcluding":"1.16.0","matchCriteriaId":"F215DB81-2592-4B04-9E76-5F69560CAD07"}]}]}],"references":[{"url":"https://allura.apache.org/posts/2023-allura-1.16.0.html","source":"security@apache.org","tags":["Patch","Vendor Advisory"]},{"url":"https://lists.apache.org/thread/hqk0vltl7qgrq215zgwjfoj0khbov0gx","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://allura.apache.org/posts/2023-allura-1.16.0.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://lists.apache.org/thread/hqk0vltl7qgrq215zgwjfoj0khbov0gx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}