Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://marc.info/?l=oss-security&m=125897425223039&w=2 | mailing list patch |
http://www.openwall.com/lists/oss-security/2009/11/23/10 | mailing list patch |
http://marc.info/?l=oss-security&m=125897327321676&w=2 | mailing list patch |
http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0379.html | mailing list exploit |
http://secunia.com/advisories/48577 | third party advisory |
http://secunia.com/advisories/36818 | third party advisory vendor advisory |
http://marc.info/?l=oss-security&m=125900327409842&w=2 | mailing list patch |
http://www.openwall.com/lists/oss-security/2009/11/20/1 | mailing list patch |
http://security.gentoo.org/glsa/glsa-201203-22.xml | vendor advisory |