Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://curl.haxx.se/docs/adv_20101013.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2010/10/13/4 | mailing list patch |
http://www.openwall.com/lists/oss-security/2010/10/13/5 | mailing list |
http://securitytracker.com/id?1024583 | vdb entry |
http://secunia.com/advisories/39532 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2010/10/13/1 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=642642 |