Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-4350 | Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-4350 | Broken Link |
https://www.openwall.com/lists/oss-security/2011/11/25/7 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 | Exploit Issue Tracking Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009 | Third Party Advisory |
Information
Published : 2019-11-25 21:15
Updated : 2020-08-18 08:05
NVD link : CVE-2011-4350
Mitre link : CVE-2011-4350
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
debian
- debian_linux
yaws
- yaws