Описание
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-3842
- https://bugzilla.redhat.com/show_bug.cgi?id=642642
- http://curl.haxx.se/docs/adv_20101013.html
- http://secunia.com/advisories/39532
- http://securitytracker.com/id?1024583
- http://www.openwall.com/lists/oss-security/2010/10/13/1
- http://www.openwall.com/lists/oss-security/2010/10/13/4
- http://www.openwall.com/lists/oss-security/2010/10/13/5
Связанные уязвимости
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, w ...