CVE-2017-10974

Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*

History

21 Nov 2024, 03:06

Type Values Removed Values Added
References () http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt - Exploit, Third Party Advisory () http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/99515 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99515 - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42303/ - Exploit, VDB Entry, Third Party Advisory () https://www.exploit-db.com/exploits/42303/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-07-07 11:29

Updated : 2024-11-21 03:06


NVD link : CVE-2017-10974

Mitre link : CVE-2017-10974

CVE.ORG link : CVE-2017-10974


JSON object : View

Products Affected

yaws

  • yaws
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')