script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.dovecot.org/doc/NEWS-2.0 | |
http://dovecot.org/pipermail/dovecot/2011-May/059085.html | patch mailing list |
http://rhn.redhat.com/errata/RHSA-2013-0520.html | vendor advisory |
http://secunia.com/advisories/52311 | third party advisory |
http://www.securityfocus.com/bid/48003 | vdb entry |
http://openwall.com/lists/oss-security/2011/05/18/4 | patch mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67674 | vdb entry |