CVE-2012-5641
Published: 18 March 2014
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
Notes
Author | Note |
---|---|
jdstrand | Windows-only |
Priority
Status
Package | Release | Status |
---|---|---|
couchdb Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
precise |
Not vulnerable
|
|
quantal |
Not vulnerable
|
|
upstream |
Released
(1.0.4, 1.2.1)
|
|
Patches: upstream: https://github.com/apache/couchdb/commit/a996d8dfbc0853f82a2cba3e482df2e7093ff839 |