Originally by @hesara
Using relative paths in directory URLs, it is possible to access some files loadable through the class loader.
The directory traversal is limited to files (not JAR contents etc.) loadable through the class loader but normally not accessible from the servlet. This can, however, include the class files of the application itself.
Some application servers may be immune to this vulnerability, but Jetty is known to be vulnerable at least in certain configurations.
Portlet 2.0 (JSR-286) portlets without a separate Vaadin servlet are not affected as static resources are not loaded through Vaadin. Portlet 1.0 (JSR-168) applications are vulnerable through the Vaadin servlet used in them.
This vulnerability was discovered by Wouter Coekaerts (http://wouter.coekaerts.be).
Imported from https://dev.vaadin.com/ issue #7670