Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.positronsecurity.com/advisories/2009-000.html | exploit |
http://www.securitytracker.com/id?1021952 | vdb entry |
http://www.securityfocus.com/archive/1/502271/100/0/threaded | mailing list |
http://secunia.com/advisories/34603 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html | vendor advisory |
http://www.securityfocus.com/bid/34306 | vdb entry |
http://secunia.com/advisories/34520 | third party advisory |
http://www.debian.org/security/2009/dsa-1914 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49548 | vdb entry |
http://trac.osgeo.org/mapserver/ticket/2942 | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html | vendor advisory |
http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html | mailing list patch |