Vulnerability Details : CVE-2011-4963
nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
Products affected by CVE-2011-4963
- cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4963
0.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4963
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2011-4963
-
http://english.securitylab.ru/lab/PT-2012-06
PT-2012-06: Security restrictions bypass in nginx for WindowsMitigation;Third Party Advisory
-
http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html
[nginx-announce] security advisoryMitigation;Vendor Advisory
-
http://nginx.org/en/security_advisories.html
nginx security advisoriesVendor Advisory
Jump to