Absolute path traversal vulnerability in the handleStartDataFile function in DigiDocSAXParser.c in libdigidoc 3.6.0.0, as used in ID-software before 3.7.2 and other products, allows remote attackers to overwrite arbitrary files via a filename beginning with / (slash) or \ (backslash) in a DDOC file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://svnweb.mageia.org/packages/updates/3/libdigidoc/current/SOURCES/libdigidoc-3.6.0.0-security-fix-DataFile-name-tag.patch?revision=472660&view=markup - Patch | |
References | () http://www.id.ee/?lang=en&id=34283#3_7_2 - | |
References | () https://bugs.mageia.org/show_bug.cgi?id=11100 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1002299 - |
Information
Published : 2013-08-29 12:07
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5648
Mitre link : CVE-2013-5648
CVE.ORG link : CVE-2013-5648
JSON object : View
Products Affected
id
- id-software
- libdigidoc
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')