CPANSA-Mojolicious-2011-02: Mojolicious vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2011-04-05T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2011-04-05T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity Critical
Original language Language en
Also referred to

Vulnerability Description

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

Vulnerabilities

CVE-2011-1589

Vulnerability Description

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

Weakness CWE-22 : Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Known affected
Product Score
Mojolicious less than 1.16
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:L/Au:N/C:P/I:N/A:N 5.0 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Apr 5 00:00:00 2011 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/