First published: Tue Nov 26 2019(Updated: )
Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/yaws | 2.0.8+dfsg-3 2.1.1+dfsg-2 2.2.0+dfsg-1 | |
Yaws | =1.91 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4350 is classified as a medium severity vulnerability due to its potential for unauthorized access to sensitive files.
To fix CVE-2011-4350, upgrade to Yaws versions 2.0.8+dfsg-3, 2.1.1+dfsg-2, or 2.2.0+dfsg-1.
CVE-2011-4350 affects Yaws version 1.91 and may impact users of Debian GNU/Linux versions 8.0 to 10.0.
CVE-2011-4350 is caused by a directory traversal vulnerability in the URL processing of the Yaws web server.
Yes, a remote authenticated user can exploit CVE-2011-4350 to read arbitrary local files from the server.