First published: Tue Mar 18 2014(Updated: )
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <=1.0.3 | |
Apache CouchDB | =1.0.0 | |
Apache CouchDB | =1.0.1 | |
Apache CouchDB | =1.0.2 | |
Apache CouchDB | =1.1.0 | |
Apache CouchDB | =1.1.1 | |
Apache CouchDB | =1.2.0 | |
Mochiweb | <=2.3.2 | |
Mochiweb | =2.1.0 | |
Mochiweb | =2.2.0 | |
Mochiweb | =2.2.1 | |
Mochiweb | =2.3.0 | |
Mochiweb | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5641 is rated as a medium severity vulnerability due to its potential for remote exploitation.
To fix CVE-2012-5641, upgrade to MochiWeb version 2.4.0 or later and ensure your Apache CouchDB is updated to versions 1.0.4, 1.1.2, or 1.2.1 or higher.
CVE-2012-5641 affects MochiWeb versions prior to 2.4.0 and Apache CouchDB versions before 1.0.4, along with specific earlier versions.
CVE-2012-5641 can be exploited through directory traversal attacks, allowing remote attackers to access arbitrary files on the server.
No, CVE-2012-5641 does not require authentication, making it potentially more dangerous for vulnerable setups.