5
CVE-2011-1589
- EPSS 2.11%
- Veröffentlicht 29.04.2011 22:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mojolicious ≫ Mojolicious Version0.2
Mojolicious ≫ Mojolicious Version0.3
Mojolicious ≫ Mojolicious Version0.4
Mojolicious ≫ Mojolicious Version0.5
Mojolicious ≫ Mojolicious Version0.6
Mojolicious ≫ Mojolicious Version0.7
Mojolicious ≫ Mojolicious Version0.8
Mojolicious ≫ Mojolicious Version0.8.1
Mojolicious ≫ Mojolicious Version0.8.2
Mojolicious ≫ Mojolicious Version0.8.3
Mojolicious ≫ Mojolicious Version0.8.4
Mojolicious ≫ Mojolicious Version0.8.5
Mojolicious ≫ Mojolicious Version0.9
Mojolicious ≫ Mojolicious Version0.8006
Mojolicious ≫ Mojolicious Version0.8007
Mojolicious ≫ Mojolicious Version0.8008
Mojolicious ≫ Mojolicious Version0.8009
Mojolicious ≫ Mojolicious Version0.9001
Mojolicious ≫ Mojolicious Version0.9002
Mojolicious ≫ Mojolicious Version0.991231
Mojolicious ≫ Mojolicious Version0.991232
Mojolicious ≫ Mojolicious Version0.991233
Mojolicious ≫ Mojolicious Version0.991234
Mojolicious ≫ Mojolicious Version0.991235
Mojolicious ≫ Mojolicious Version0.991236
Mojolicious ≫ Mojolicious Version0.991237
Mojolicious ≫ Mojolicious Version0.991238
Mojolicious ≫ Mojolicious Version0.991239
Mojolicious ≫ Mojolicious Version0.991240
Mojolicious ≫ Mojolicious Version0.991241
Mojolicious ≫ Mojolicious Version0.991242
Mojolicious ≫ Mojolicious Version0.991243
Mojolicious ≫ Mojolicious Version0.991244
Mojolicious ≫ Mojolicious Version0.991245
Mojolicious ≫ Mojolicious Version0.991246
Mojolicious ≫ Mojolicious Version0.991250
Mojolicious ≫ Mojolicious Version0.991251
Mojolicious ≫ Mojolicious Version0.999901
Mojolicious ≫ Mojolicious Version0.999902
Mojolicious ≫ Mojolicious Version0.999903
Mojolicious ≫ Mojolicious Version0.999904
Mojolicious ≫ Mojolicious Version0.999905
Mojolicious ≫ Mojolicious Version0.999906
Mojolicious ≫ Mojolicious Version0.999907
Mojolicious ≫ Mojolicious Version0.999908
Mojolicious ≫ Mojolicious Version0.999909
Mojolicious ≫ Mojolicious Version0.999910
Mojolicious ≫ Mojolicious Version0.999911
Mojolicious ≫ Mojolicious Version0.999912
Mojolicious ≫ Mojolicious Version0.999913
Mojolicious ≫ Mojolicious Version0.999914
Mojolicious ≫ Mojolicious Version0.999920
Mojolicious ≫ Mojolicious Version0.999921
Mojolicious ≫ Mojolicious Version0.999922
Mojolicious ≫ Mojolicious Version0.999923
Mojolicious ≫ Mojolicious Version0.999924
Mojolicious ≫ Mojolicious Version0.999925
Mojolicious ≫ Mojolicious Version0.999926
Mojolicious ≫ Mojolicious Version0.999927
Mojolicious ≫ Mojolicious Version0.999928
Mojolicious ≫ Mojolicious Version0.999929
Mojolicious ≫ Mojolicious Version0.999930
Mojolicious ≫ Mojolicious Version0.999931
Mojolicious ≫ Mojolicious Version0.999932
Mojolicious ≫ Mojolicious Version0.999933
Mojolicious ≫ Mojolicious Version0.999934
Mojolicious ≫ Mojolicious Version0.999935
Mojolicious ≫ Mojolicious Version0.999936
Mojolicious ≫ Mojolicious Version0.999937
Mojolicious ≫ Mojolicious Version0.999938
Mojolicious ≫ Mojolicious Version0.999939
Mojolicious ≫ Mojolicious Version0.999940
Mojolicious ≫ Mojolicious Version0.999941
Mojolicious ≫ Mojolicious Version0.999950
Mojolicious ≫ Mojolicious Version1.0
Mojolicious ≫ Mojolicious Version1.1
Mojolicious ≫ Mojolicious Version1.01
Mojolicious ≫ Mojolicious Version1.11
Mojolicious ≫ Mojolicious Version1.12
Mojolicious ≫ Mojolicious Version1.13
Mojolicious ≫ Mojolicious Version1.14
Mojolicious ≫ Mojolicious Version1.15
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.11% | 0.825 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.