Package: nginx Version: 0.7.61-1 Severity: normal Tags: security Hi, a directory traversal vulnerability has been found in nginx.
[0]: > With webdav you can for example copy or move files from one to a different > location. The move and copy methods require a "Destination:" HTTP header. > The destination header contains information about where the file > should be placed. > By using characters like "../" the attacker can traverse down the directory > tree and place files outside the webroot. This is an insecure behaviour of > the nginx webdav module and can be especially dangerous when nginx is used > in a virtual hosting environment. nginx runs as the user nobody per default > so normally this bug is not a big deal since an attacker may only be allowed > to write files to /tmp/ or nobody owned directories. The severity is low > because this attack requires webdav "upload" permissions. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry, whenever one is assigned. For further information see: [0] http://archives.neohapsis.com/archives/fulldisclosure/2009-09/0379.html Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org