| Vulnerability Name: | CVE-2011-4350 (CCN-151390) | ||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2011-11-25 | ||||||||||||||||||||||||||||||||||||||||
| Published: | 2011-11-25 | ||||||||||||||||||||||||||||||||||||||||
| Updated: | 2020-08-18 | ||||||||||||||||||||||||||||||||||||||||
| Summary: | Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request. | ||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N) 3.0 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-22 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2011-4350 Source: CCN Type: Yaws Web site Yaws Source: MISC Type: Broken Link https://access.redhat.com/security/cve/cve-2011-4350 Source: MISC Type: Third Party Advisory https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009 Source: CCN Type: Red Hat Bugzilla Bug 757181 CVE-2011-4350 yaws: Directory traversal flaw Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 Source: XF Type: UNKNOWN yaws-cve20114350-dir-trav(151390) Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2011-4350 Source: CCN Type: oss-sec Mailing List, Fri, 25 Nov 2011 18:39:18 +0100 CVE Request -- yaws -- Directory traversal flaw Source: MISC Type: Mailing List, Third Party Advisory https://www.openwall.com/lists/oss-security/2011/11/25/7 Source: CCN Type: WhiteSource Vulnerability Database CVE-2011-4350 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||