[ASA-201902-18] hiawatha: directory traversal

Jelle van der Waa jelle at archlinux.org
Mon Feb 18 10:02:40 UTC 2019


Arch Linux Security Advisory ASA-201902-18
==========================================

Severity: High
Date    : 2019-02-16
CVE-ID  : CVE-2019-8358
Package : hiawatha
Type    : directory traversal
Remote  : Yes
Link    : https://security.archlinux.org/AVG-900

Summary
=======

The package hiawatha before version 10.8.4-1 is vulnerable to directory
traversal.

Resolution
==========

Upgrade to 10.8.4-1.

# pacman -Syu "hiawatha>=10.8.4-1"

The problem has been fixed upstream in version 10.8.4.

Workaround
==========

None.

Description
===========

In Hiawatha before 10.8.4 a remote attacker is able to do directory
traversal if AllowDotFiles is enabled.

Impact
======

A remote attacker is able to read arbitrary files from a hiawatha
server.

References
==========

https://www.hiawatha-webserver.org/changelog
https://security.archlinux.org/CVE-2019-8358
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190218/0d8975f0/attachment.sig>


More information about the arch-security mailing list