CVE-2014-5269

Plack::App::File in Plack before 1.0031 removes trailing slash characters from paths, which allows remote attackers to bypass the whitelist of generated files and obtain sensitive information via a crafted path, related to Plack::Middleware::Static.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plack_project:plack:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://api.metacpan.org/source/MIYAGAWA/Plack-1.0031/Changes - () http://api.metacpan.org/source/MIYAGAWA/Plack-1.0031/Changes -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137099.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137099.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137115.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137115.html -
References () http://seclists.org/oss-sec/2014/q3/384 - () http://seclists.org/oss-sec/2014/q3/384 -
References () http://www.osvdb.org/109928 - () http://www.osvdb.org/109928 -
References () https://github.com/avar/Plack/commit/bc1731dbb53850c380875ad683cd87c8ec99eee3 - Patch, Vendor Advisory () https://github.com/avar/Plack/commit/bc1731dbb53850c380875ad683cd87c8ec99eee3 - Patch, Vendor Advisory
References () https://github.com/plack/Plack/issues/405 - Patch, Vendor Advisory () https://github.com/plack/Plack/issues/405 - Patch, Vendor Advisory

Information

Published : 2014-09-04 17:55

Updated : 2024-11-21 02:11


NVD link : CVE-2014-5269

Mitre link : CVE-2014-5269

CVE.ORG link : CVE-2014-5269


JSON object : View

Products Affected

plack_project

  • plack
CWE
CWE-264

Permissions, Privileges, and Access Controls