Vulnerability Details : CVE-2014-5269
Plack::App::File in Plack before 1.0031 removes trailing slash characters from paths, which allows remote attackers to bypass the whitelist of generated files and obtain sensitive information via a crafted path, related to Plack::Middleware::Static.
Products affected by CVE-2014-5269
- cpe:2.3:a:plack_project:plack:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5269
0.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5269
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-5269
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5269
-
http://seclists.org/oss-sec/2014/q3/384
oss-sec: Re: CVE Request: Plack::App::File does not prune trailing slashes: possible code exposure / information disclosure
-
https://github.com/avar/Plack/commit/bc1731dbb53850c380875ad683cd87c8ec99eee3
Plack::App::File: Fix a security issue by not pruning trailing slashes · avar/Plack@bc1731d · GitHubPatch;Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137115.html
[SECURITY] Fedora 20 Update: perl-Plack-1.0031-1.fc20
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/137099.html
[SECURITY] Fedora 19 Update: perl-Plack-1.0031-1.fc19
-
http://api.metacpan.org/source/MIYAGAWA/Plack-1.0031/Changes
MetaCPAN v0 API
-
https://github.com/plack/Plack/issues/405
Plack::App::File prunes trailing slashes via split() invocation · Issue #405 · plack/Plack · GitHubPatch;Vendor Advisory
Jump to