Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/47299 | third party advisory |
http://git.gnome.org/browse/libsoup/tree/NEWS | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2011-1102.html | vendor advisory |
http://www.securitytracker.com/id?1025864 | vdb entry |
http://www.debian.org/security/2011/dsa-2369 | vendor advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=653258 | patch |
http://www.ubuntu.com/usn/USN-1181-1 | vendor advisory |