CPANSA-Mojolicious-2018-02: Mojolicious vulnerability
Publisher | giterlizzi | Document category | csaf_informational_advisory |
---|---|---|---|
Initial release date | 2018-05-11T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2018-05-11T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | Critical | |
Original language | Language | en | |
Also referred to |
Vulnerability Description
GET requests with embedded backslashes can be used to access local files on Windows hosts
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Mojolicious-2018-02 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2018/cpansa-mojolicious-2018-02.json - https://github.com/mojolicious/mojo/pull/1217 external
https://github.com/mojolicious/mojo/pull/1217 - https://github.com/mojolicious/mojo/commit/23ebe051d9378f0f122e3c908845fc0c2cae0106 external
https://github.com/mojolicious/mojo/commit/23ebe051d9378f0f122e3c908845fc0c2cae0106
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Fri May 11 00:00:00 2018 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/