Absolute path traversal vulnerability in cantata before 1.2.2 allows local users to read arbitrary files via a full pathname in a request to the internal httpd server. NOTE: this vulnerability can be leveraged by remote attackers using CVE-2013-7301.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://code.google.com/p/cantata/issues/detail?id=356 | exploit |
http://seclists.org/oss-sec/2014/q1/124 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90580 | vdb entry |
http://seclists.org/oss-sec/2014/q1/121 | mailing list |