Date: Thu, 18 Feb 2016 18:02:21 -0500 From: Ignace Mouzannar <mouzannar@...il.com> To: oss-security@...ts.openwall.com Cc: security@...ian.org, Alexander Izmailov <yarolig@...il.com> Subject: CVE request: didiwiki path traversal vulnerability Hello, Please can I have a CVE assigned to the following vulnerability? - Versions Affected: all versions of didiwiki - Bug discovered by: Alexander Izmailov - Patch Available: https://github.com/OpenedHand/didiwiki/pull/1/files - Patch provided by: Alexander Izmailov - Description: Allows a user to access any file on the filesystem from the browser. To reproduce it, on Debian: ---- apt-get install didiwiki curl http://localhost:8000/api/page/get?page=/etc/passwd ---- Thank you for your help. Ignace M
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ