First published: Fri Apr 20 2018(Updated: )
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Psensor | <1.1.4 | |
Debian GNU/Linux | =7.0 |
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=48739caa745f9f8002e87af574f03e5dc6ae3447
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-10073 is considered a medium severity vulnerability due to its exploitation potential for directory traversal.
To fix CVE-2014-10073, upgrade Psensor to version 1.1.4 or later, which addresses the directory traversal issue.
CVE-2014-10073 affects Psensor versions prior to 1.1.4 and Debian GNU/Linux version 7.0.
Yes, CVE-2014-10073 can potentially allow unauthorized access to files outside the intended webserver directory.
The root cause of CVE-2014-10073 is the lack of validation in the create_response function that allows directory traversal.