CVE-2011-1589
Published: 29 April 2011
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Priority
Status
Package | Release | Status |
---|---|---|
libmojolicious-perl Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Does not exist
|
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Not vulnerable
(1.21-1)
|
|
precise |
Not vulnerable
(1.21-1)
|
|
quantal |
Not vulnerable
(1.21-1)
|
|
upstream |
Released
(1.16)
|
|
Patches: upstream: https://github.com/kraih/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818 |