Vulnerability Details : CVE-2011-2524
Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
Vulnerability category: Directory traversal
Products affected by CVE-2011-2524
- cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.98:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.99:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.25.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.29.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.29.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.31.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.31.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.33.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.33.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.96:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.97:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.104:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.23.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.24.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.26.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.26.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.28.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.30.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.31.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.33.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.33.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.94:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.95.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.102:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.103:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.23.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.23.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.25.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.25.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.29.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.30.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.32.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.32.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.34.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.93:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.100:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.2.101:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.23.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.25.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.25.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.27.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.29.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.29.90:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.31.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.32.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.33.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:libsoup:2.34.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2524
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-2524
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2524
-
https://bugzilla.gnome.org/show_bug.cgi?id=653258
Bug 653258 – Directory traversal bug in soup-uri.c using url-encoded periodsPatch
-
http://www.debian.org/security/2011/dsa-2369
Debian -- Security Information -- DSA-2369-1 libsoup2.4
-
http://git.gnome.org/browse/libsoup/tree/NEWS
NEWS · master · GNOME / libsoup · GitLab
-
http://www.redhat.com/support/errata/RHSA-2011-1102.html
SupportVendor Advisory
-
http://www.securitytracker.com/id?1025864
libsoup SoupServer Directory Traversal Flaw Lets Remote Users Obtain Files - SecurityTracker
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063431.html
[SECURITY] Fedora 15 Update: libsoup-2.34.3-1.fc15
-
http://secunia.com/advisories/47299
Sign in
-
http://www.ubuntu.com/usn/USN-1181-1
USN-1181-1: libsoup vulnerability | Ubuntu security notices
Jump to