Summary: | <www-servers/nginx-0.7.64 WebDAV Directory traversal vulnerability (CVE-2009-3898) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | cla, hollow, voxus |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/36818/ | ||
Whiteboard: | C1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 293785 | ||
Bug Blocks: |
Description
Stefan Behte (RETIRED)
2009-11-20 01:23:08 UTC
CVE-2009-3898 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3898): Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method. C1 needs a GLSA, request filed. 0.7.64 is in the stable trees, resolving. reopening. Dirkjan, do not close security bugs, if you're not sure it's the right thing to close them. This issue was resolved and addressed in GLSA 201203-22 at http://security.gentoo.org/glsa/glsa-201203-22.xml by GLSA coordinator Sean Amoss (ackle). *** Bug 286391 has been marked as a duplicate of this bug. *** |