Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/47908 | third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2012-02/0025.html | mailing list broken link |
http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html | third party advisory mailing list |
http://www.securitytracker.com/id?1026641 | vdb entry third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73049 | vdb entry third party advisory |
http://www.mathopd.org/security.html | vendor advisory |
http://osvdb.org/78896 | vdb entry broken link |