First published: Sun Apr 17 2011(Updated: )
A directory traversal flaw was found in Mojolicious [1]. Because Mojolicious did not unescape paths before processing them, a user could use it to view arbitrary files using '%2f' rather than '/' (for example: %2f..%2f). This has been corrected in upstream version 1.17 [2]. [1] <a href="https://github.com/kraih/mojo/issues/114">https://github.com/kraih/mojo/issues/114</a> [2] <a href="https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818">https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Mojolicious | <1.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-697229 is classified as high due to the potential for unauthorized file access.
To fix REDHAT-BUG-697229, upgrade Mojolicious to version 1.17 or later.
REDHAT-BUG-697229 is a directory traversal vulnerability that allows access to arbitrary files.
Mojolicious versions prior to 1.17 are affected by REDHAT-BUG-697229.
The directory traversal in REDHAT-BUG-697229 allows users to exploit unescaped paths, enabling access to files using encoded sequences like '%2f'.