Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-25623

Published: 2 October 2020

Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.

Notes

AuthorNote
mdeslaur
per upstream, introduced in OTP 22.3.1 and corrected in OTP
22.3.4.6. It was also introduced in OTP 23.0 and corrected in
OTP 23.1

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
erlang
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(1:20.2.2+dfsg-1ubuntu2)
focal Not vulnerable
(1:22.2.7+dfsg-1)
trusty Not vulnerable

upstream
Released (1:23.1+dfsg-1)
xenial Not vulnerable
(1:18.3-dfsg-1ubuntu3.1)
Patches:
upstream: https://github.com/erlang/otp/commit/5296ae6c4761f26600c05e447cb0bda78a93b602
upstream: https://github.com/erlang/otp/commit/5296ae6c4761f26600c05e447cb0bda78a93b602

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N