View | Details | Raw Unified | Return to bug 203096 | Differences between
and this patch

Collapse All | Expand All

(-)b/security/vuxml/vuln.xml (+32 lines)
Lines 58-63 Notes: Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="31ea7f73-5c55-11e5-8607-74d02b9a84d5">
62
    <topic>h2o directory traversal vulnerability</topic>
63
    <affects>
64
      <package>
65
	<name>h2o</name>
66
	<range><lt>1.4.5</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Yakuzo reports:</p>
72
	<blockquote cite="https://h2o.examp1e.net/vulnerabilities.html">
73
	  <p>H2O (up to version 1.4.4 / 1.5.0-beta1) contains a flaw in its URL
74
	    normalization logic.  When file.dir directive is used, this flaw
75
	    allows a remote attacker to retrieve arbitrary files that exist
76
	    outside the directory specified by the directive.  H2O version 1.4.5
77
	    and version 1.5.0-beta2 have been released to address this
78
	    vulnerability.  Users are advised to upgrade their servers
79
	    immediately.  The vulnerability was reported by: Yusuke OSUMI.</p>
80
	</blockquote>
81
      </body>
82
    </description>
83
    <references>
84
      <cvename>CVE-2015-5638</cvename>
85
      <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5638</url>
86
    </references>
87
    <dates>
88
      <discovery>2015-09-14</discovery>
89
      <entry>2015-09-16</entry>
90
    </dates>
91
  </vuln>
92
61
  <vuln vid="f4ce64c2-5bd4-11e5-9040-3c970e169bc2">
93
  <vuln vid="f4ce64c2-5bd4-11e5-9040-3c970e169bc2">
62
    <topic>wordpress -- multiple vulnerabilities</topic>
94
    <topic>wordpress -- multiple vulnerabilities</topic>
63
    <affects>
95
    <affects>

Return to bug 203096