A directory traversal flaw was found in the way yaws, web server for dynamic content written in Erlang, processed certain URLs. A remote, authenticated yaws user could use this flaw to obtain content of arbitrary local file, available to the yaws server user via specially-crafted URL request. References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009 [2] https://github.com/klacke/yaws/issues/69
Public PoC from [1]: ==================== curl 'http://localhost:8080/..\\..\\..\\..\\/etc/passwd' I am not sure, versions of yaws, as shipped in Fedora release of 14, 15, and 16, and as shipped with Fedora EPEL 6, are affected by this issue. Have tried above PoC (and couple of its combinations), but was unsuccessful to reproduce the issue (even with 'auth' disabled).
CVE request: [3] http://www.openwall.com/lists/oss-security/2011/11/25/5
Created yaws tracking bugs for this issue Affects: fedora-all [bug 757183] Affects: epel-6 [bug 757184]
I'll take a closer look tomorrow on this issue.
We don't appear to have fixed CVE-2010-4181 (similar issue, directory traversal)?
This was assigned CVE-2011-4350: http://www.openwall.com/lists/oss-security/2011/11/25/7
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.