First published: Wed Nov 07 2018(Updated: )
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lighttpd Lighttpd | <1.4.50 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
SUSE SUSE Linux Enterprise Server | =11-sp3 | |
SUSE SUSE Linux Enterprise Server | =11-sp4 | |
SUSE SUSE Linux Enterprise Server | =12 | |
SUSE SUSE Linux Enterprise Server | =12-sp1 | |
SUSE SUSE Linux Enterprise Server | =12-sp2 | |
SUSE SUSE Linux Enterprise Server | =12-sp3 | |
SUSE SUSE Linux Enterprise Server | =12-sp4 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19052 is a vulnerability in mod_alias_physical_handler in lighttpd before version 1.4.50.
CVE-2018-19052 has a severity rating of high with a score of 7.5.
The affected software for CVE-2018-19052 includes Lighttpd before version 1.4.50, openSUSE Backports SLE 15.0 and 15.0-sp1, openSUSE Leap 15.0 and 15.1, SUSE Linux Enterprise Server 11-sp3 and 11-sp4, and Debian Linux 9.0.
CVE-2018-19052 allows for potential path traversal of a single directory above an alias target, which can lead to unauthorized access or disclosure of sensitive information.
To fix CVE-2018-19052, users should upgrade to lighttpd version 1.4.50 or apply the necessary patches provided by the software vendor.