httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 26152] - Apache 1.3.29 and below directory traversal vulnerability
Date Wed, 04 Feb 2004 16:44:03 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152

Apache 1.3.29 and below directory traversal vulnerability





------- Additional Comments From tolj@wapme-systems.de  2004-02-04 16:44 -------
the attched patch implements an cygwin specific as_os_canonical_filename() 
within src/os/cygwin/util_cygwin.c to map backslashes (that unfortunatly are 
interpreted by the cygwin os layer) to slashes. This allows the later security 
holders to grap within the directory_walk() and file_walk() routines.

Please review and apply. Update bug to fixed then.

stipe

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message