CVE-2012-1050

Loading...

General

Score:4.3/10.0
Severity:Low
Category:Path Manipulation

Impact Metrics

Confidentiality:Partial
Integrity:None
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Published on 13/02/12 - Updated on 29/08/17

Description

Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.

Category: Path Manipulation

CWE-22 (Path Traversal)
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Security Notices

US National Vulnerability DatabaseCVE-2012-1050

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
mathopdmathopd

Share this vulnerability with:

Twitter Facebook LinkedIn Mail