Directory Traversal Vulnerability in MochiWeb Allows Arbitrary File Reading

Directory Traversal Vulnerability in MochiWeb Allows Arbitrary File Reading

CVE-2012-5641 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.

Learn more about our Cis Benchmark Audit For Apache Http Server.