Package: nginx
Version: 0.7.61-1
Severity: normal
Tags: security

Hi,
a directory traversal vulnerability has been found in nginx.

[0]:
> With webdav you can for example copy or move files from one to a different
> location. The move and copy methods require a "Destination:" HTTP header.
> The destination header contains information about where the file
> should be placed.
> By using characters like "../" the attacker can traverse down the directory
> tree and place files outside the webroot. This is an insecure behaviour of
> the nginx webdav module and can be especially dangerous when nginx is used
> in a virtual hosting environment. nginx runs as the user nobody per default
> so normally this bug is not a big deal since an attacker may only be allowed
> to write files to /tmp/ or nobody owned directories. The severity is low
> because this attack requires webdav "upload" permissions.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry, whenever one is assigned.

For further information see:

[0] http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0379.html

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to