mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://trac.osgeo.org/mapserver/ticket/2941 | |
http://www.positronsecurity.com/advisories/2009-000.html | exploit |
http://www.securitytracker.com/id?1021952 | vdb entry |
http://www.securityfocus.com/archive/1/502271/100/0/threaded | mailing list |
http://secunia.com/advisories/34603 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html | vendor advisory |
http://www.securityfocus.com/bid/34306 | vdb entry |
http://secunia.com/advisories/34520 | third party advisory |
http://www.debian.org/security/2009/dsa-1914 | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html | vendor advisory |
http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html | mailing list patch vendor advisory |