Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2012-5641

CVE information

Published

10 years ago

Last Modified

6 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:apache:couchdb:1.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:2.3.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:2.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:1.1.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:2.2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:1.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:1.0.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:2.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:1.2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mochiweb_project:mochiweb:2.1.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apache:couchdb:1.1.1:*:*:*:*:*:*:*
  Yes
- -