First published: Tue Mar 18 2014(Updated: )
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CouchDB | <=1.0.3 | |
Apache CouchDB | =1.0.0 | |
Apache CouchDB | =1.0.1 | |
Apache CouchDB | =1.0.2 | |
Apache CouchDB | =1.1.0 | |
Apache CouchDB | =1.1.1 | |
Apache CouchDB | =1.2.0 | |
Mochiweb Project Mochiweb | <=2.3.2 | |
Mochiweb Project Mochiweb | =2.1.0 | |
Mochiweb Project Mochiweb | =2.2.0 | |
Mochiweb Project Mochiweb | =2.2.1 | |
Mochiweb Project Mochiweb | =2.3.0 | |
Mochiweb Project Mochiweb | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.