Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 25 Nov 2011 18:39:18 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com
Subject: CVE Request -- yaws -- Directory traversal flaw

Hello Kurt, Steve, vendors,

   a directory traversal flaw was found in the way yaws, web server
for dynamic content written in Erlang, processed certain URLs. A
remote, authenticated yaws user could use this flaw to obtain content
of arbitrary local file, available to the yaws server user via
specially-crafted URL request.

References:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009
[2] https://github.com/klacke/yaws/issues/69
[3] https://bugzilla.redhat.com/show_bug.cgi?id=757181

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

P.S.: As of right now, according to [2], there doesn't seem
       to be an upstream patch for this issue available yet.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.