ArchLinux: 201902-18: hiawatha: directory traversal

    Date18 Feb 2019
    CategoryArchLinux
    381
    Posted ByLinuxSecurity Advisories
    The package hiawatha before version 10.8.4-1 is vulnerable to directory traversal.
    Arch Linux Security Advisory ASA-201902-18
    ==========================================
    
    Severity: High
    Date    : 2019-02-16
    CVE-ID  : CVE-2019-8358
    Package : hiawatha
    Type    : directory traversal
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-900
    
    Summary
    =======
    
    The package hiawatha before version 10.8.4-1 is vulnerable to directory
    traversal.
    
    Resolution
    ==========
    
    Upgrade to 10.8.4-1.
    
    # pacman -Syu "hiawatha>=10.8.4-1"
    
    The problem has been fixed upstream in version 10.8.4.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    In Hiawatha before 10.8.4 a remote attacker is able to do directory
    traversal if AllowDotFiles is enabled.
    
    Impact
    ======
    
    A remote attacker is able to read arbitrary files from a hiawatha
    server.
    
    References
    ==========
    
    https://www.hiawatha-webserver.org/changelog
    https://security.archlinux.org/CVE-2019-8358
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    In your opinion, what is the biggest advantage associated with choosing open-source software/products?

    Message!

    Poll results are hidden from public viewing.

    You are not authorized to vote on this poll.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote
    8
    radio
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.