[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Directory traversal vulnerability in Apache CouchDB - CVE-2012-5641

ID: oval:org.secpod.oval:def:60224Date: (C)2019-12-20   (M)2021-06-06
Class: VULNERABILITYFamily: windows




The host is installed with Apache CouchDB before 1.0.4, 1.1.x before 1.1.2 or 1.2.x before 1.2.1 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle the partition2 function in mochiweb_util.erl. Successful exploitation could allow remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

Platform:
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Product:
Apache CouchDB
Reference:
CVE-2012-5641
CVE    1
CVE-2012-5641

© SecPod Technologies