{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55104?format=json","vulnerability_id":"VCID-w2pp-yafq-aqbu","summary":"The Undertow module of WildFly allows source code disclosure\nThe Undertow module of WildFly versions  8.1.0.Final, 8.2.0.Final, 9.0.0.CR1  allows remote attackers to obtain the source code of a JSP page via a \"/\" at the end of a URL.","aliases":[{"alias":"CVE-2015-3198"},{"alias":"GHSA-4vwv-x3gp-2j4g"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82275?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@9.0.0.CR2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@9.0.0.CR2"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/250501?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@8.1.0.Final","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@8.1.0.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/250502?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@8.2.0.Final","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@8.2.0.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/250503?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@8.2.1.Final","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@8.2.1.Final"},{"url":"http://public2.vulnerablecode.io/api/packages/250504?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@9.0.0.Alpha1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@9.0.0.Alpha1"},{"url":"http://public2.vulnerablecode.io/api/packages/250505?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@9.0.0.Beta1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@9.0.0.Beta1"},{"url":"http://public2.vulnerablecode.io/api/packages/250506?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@9.0.0.Beta2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@9.0.0.Beta2"},{"url":"http://public2.vulnerablecode.io/api/packages/250507?format=json","purl":"pkg:maven/org.wildfly/wildfly-parent@9.0.0.CR1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bgcg-gmuk-ebhc"},{"vulnerability":"VCID-ft9p-n5ew-abbf"},{"vulnerability":"VCID-gmv1-qasy-tbcq"},{"vulnerability":"VCID-mapy-1mup-wfgx"},{"vulnerability":"VCID-tzmu-y1p4-8bac"},{"vulnerability":"VCID-w2pp-yafq-aqbu"},{"vulnerability":"VCID-zea8-w4br-6qas"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.wildfly/wildfly-parent@9.0.0.CR1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3198.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3198","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60347","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6021","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60226","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60171","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60218","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60275","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60234","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6026","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60252","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3198"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1224787","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1224787"},{"reference_url":"https://developer.jboss.org/message/927301#927301","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://developer.jboss.org/message/927301#927301"},{"reference_url":"https://issues.jboss.org/browse/WFLY-4595","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.jboss.org/browse/WFLY-4595"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3198","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3198"},{"reference_url":"https://stackoverflow.com/questions/30028346/with-trailing-slash-in-url-jsp-show-source-code","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://stackoverflow.com/questions/30028346/with-trailing-slash-in-url-jsp-show-source-code"},{"reference_url":"https://github.com/advisories/GHSA-4vwv-x3gp-2j4g","reference_id":"GHSA-4vwv-x3gp-2j4g","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-4vwv-x3gp-2j4g"}],"weaknesses":[{"cwe_id":200,"name":"Exposure of Sensitive Information to an Unauthorized Actor","description":"The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information."},{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2pp-yafq-aqbu"}