CWE
22
Advisory Published
CVE Published
Updated

CVE-2011-1589: Path Traversal

First published: Sun Apr 17 2011(Updated: )

A directory traversal flaw was found in Mojolicious [1]. Because Mojolicious did not unescape paths before processing them, a user could use it to view arbitrary files using '%2f' rather than '/' (for example: %2f..%2f). This has been corrected in upstream version 1.17 [2]. [1] <a href="https://github.com/kraih/mojo/issues/114">https://github.com/kraih/mojo/issues/114</a> [2] <a href="https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818">https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818</a>

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Mojolicious=0.2
Mojolicious=0.3
Mojolicious=0.4
Mojolicious=0.5
Mojolicious=0.6
Mojolicious=0.7
Mojolicious=0.8
Mojolicious=0.8.1
Mojolicious=0.8.2
Mojolicious=0.8.3
Mojolicious=0.8.4
Mojolicious=0.8.5
Mojolicious=0.9
Mojolicious=0.8006
Mojolicious=0.8007
Mojolicious=0.8008
Mojolicious=0.8009
Mojolicious=0.9001
Mojolicious=0.9002
Mojolicious=0.991231
Mojolicious=0.991232
Mojolicious=0.991233
Mojolicious=0.991234
Mojolicious=0.991235
Mojolicious=0.991236
Mojolicious=0.991237
Mojolicious=0.991238
Mojolicious=0.991239
Mojolicious=0.991240
Mojolicious=0.991241
Mojolicious=0.991242
Mojolicious=0.991243
Mojolicious=0.991244
Mojolicious=0.991245
Mojolicious=0.991246
Mojolicious=0.991250
Mojolicious=0.991251
Mojolicious=0.999901
Mojolicious=0.999902
Mojolicious=0.999903
Mojolicious=0.999904
Mojolicious=0.999905
Mojolicious=0.999906
Mojolicious=0.999907
Mojolicious=0.999908
Mojolicious=0.999909
Mojolicious=0.999910
Mojolicious=0.999911
Mojolicious=0.999912
Mojolicious=0.999913
Mojolicious=0.999914
Mojolicious=0.999920
Mojolicious=0.999921
Mojolicious=0.999922
Mojolicious=0.999923
Mojolicious=0.999924
Mojolicious=0.999925
Mojolicious=0.999926
Mojolicious=0.999927
Mojolicious=0.999928
Mojolicious=0.999929
Mojolicious=0.999930
Mojolicious=0.999931
Mojolicious=0.999932
Mojolicious=0.999933
Mojolicious=0.999934
Mojolicious=0.999935
Mojolicious=0.999936
Mojolicious=0.999937
Mojolicious=0.999938
Mojolicious=0.999939
Mojolicious=0.999940
Mojolicious=0.999941
Mojolicious=0.999950
Mojolicious=1.0
Mojolicious=1.1
Mojolicious=1.01
Mojolicious=1.11
Mojolicious=1.12
Mojolicious=1.13
Mojolicious=1.14
Mojolicious=1.15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2011-1589?

    CVE-2011-1589 is considered as having moderate severity due to its potential for unauthorized file access.

  • How do I fix CVE-2011-1589?

    To fix CVE-2011-1589, upgrade to Mojolicious version 1.17 or later where the vulnerability has been patched.

  • What versions of Mojolicious are affected by CVE-2011-1589?

    CVE-2011-1589 affects Mojolicious versions including 0.8007 and up to 1.0, before the fix in version 1.17.

  • What type of vulnerability is CVE-2011-1589?

    CVE-2011-1589 is a directory traversal vulnerability that allows unauthorized file access.

  • Are there any known exploits for CVE-2011-1589?

    Yes, CVE-2011-1589 could potentially be exploited to access arbitrary files by manipulating URL paths.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203