First published: Thu Jul 26 2012(Updated: )
nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | >=0.7.52<1.2.1 | |
Nginx | =1.3.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4963 is classified as a medium severity vulnerability.
To mitigate CVE-2011-4963, upgrade nginx to version 1.3.1 or later, or 1.2.1 or later.
CVE-2011-4963 allows remote attackers to bypass access controls and access restricted files.
CVE-2011-4963 affects nginx versions before 1.3.1 and 1.2.1, specifically 1.3.0 and earlier.
Yes, CVE-2011-4963 can affect nginx installations running on Windows versions prior to the security updates.