First published: Tue Jan 12 2016(Updated: )
Directory traversal vulnerability in the HTTP file-serving module (mod_http_files) in Prosody 0.9.x before 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) in an unspecified path.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =22 | |
Fedora | =23 | |
Prosody | =0.9.0 | |
Prosody | =0.9.1 | |
Prosody | =0.9.2 | |
Prosody | =0.9.3 | |
Prosody | =0.9.4 | |
Prosody | =0.9.5 | |
Prosody | =0.9.6 | |
Prosody | =0.9.7 | |
Prosody | =0.9.8 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1231 is considered a medium severity vulnerability due to its ability to allow remote attackers to read arbitrary files on the server.
To fix CVE-2016-1231, upgrade Prosody to version 0.9.9 or later to patch the directory traversal vulnerability.
CVE-2016-1231 affects Prosody versions 0.9.0 through 0.9.8.
Vulnerable systems include specific versions of Fedora and Debian Linux that are running affected versions of Prosody.
Yes, CVE-2016-1231 can be exploited remotely by attackers through the HTTP file-serving module.