CVE-2012-5641
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
18/03/2014
Last modified:
12/04/2025
Description
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:* | 1.0.3 (including) | |
| cpe:2.3:a:apache:couchdb:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:couchdb:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:couchdb:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:couchdb:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:couchdb:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:couchdb:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mochiweb_project:mochiweb:*:*:*:*:*:*:*:* | 2.3.2 (including) | |
| cpe:2.3:a:mochiweb_project:mochiweb:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mochiweb_project:mochiweb:2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mochiweb_project:mochiweb:2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mochiweb_project:mochiweb:2.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mochiweb_project:mochiweb:2.3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/fulldisclosure/2013/Jan/81
- http://secunia.com/advisories/51765
- http://www.securityfocus.com/bid/57313
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81240
- https://github.com/melkote/mochiweb/commit/ac2bf
- https://github.com/mochi/mochiweb/issues/92
- http://seclists.org/fulldisclosure/2013/Jan/81
- http://secunia.com/advisories/51765
- http://www.securityfocus.com/bid/57313
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81240
- https://github.com/melkote/mochiweb/commit/ac2bf
- https://github.com/mochi/mochiweb/issues/92



