7.5
CWE
22
Advisory Published
Updated

CVE-2018-19052: Path Traversal

First published: Wed Nov 07 2018(Updated: )

An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Lighttpd Lighttpd<1.4.50
openSUSE Backports SLE=15.0
openSUSE Backports SLE=15.0-sp1
openSUSE Leap=15.0
openSUSE Leap=15.1
SUSE SUSE Linux Enterprise Server=11-sp3
SUSE SUSE Linux Enterprise Server=11-sp4
SUSE SUSE Linux Enterprise Server=12
SUSE SUSE Linux Enterprise Server=12-sp1
SUSE SUSE Linux Enterprise Server=12-sp2
SUSE SUSE Linux Enterprise Server=12-sp3
SUSE SUSE Linux Enterprise Server=12-sp4
Debian Debian Linux=9.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2018-19052?

    CVE-2018-19052 is a vulnerability in mod_alias_physical_handler in lighttpd before version 1.4.50.

  • What is the severity of CVE-2018-19052?

    CVE-2018-19052 has a severity rating of high with a score of 7.5.

  • What is the affected software for CVE-2018-19052?

    The affected software for CVE-2018-19052 includes Lighttpd before version 1.4.50, openSUSE Backports SLE 15.0 and 15.0-sp1, openSUSE Leap 15.0 and 15.1, SUSE Linux Enterprise Server 11-sp3 and 11-sp4, and Debian Linux 9.0.

  • How does CVE-2018-19052 impact the system?

    CVE-2018-19052 allows for potential path traversal of a single directory above an alias target, which can lead to unauthorized access or disclosure of sensitive information.

  • How can I fix CVE-2018-19052?

    To fix CVE-2018-19052, users should upgrade to lighttpd version 1.4.50 or apply the necessary patches provided by the software vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203