Path traversal in CouchDB and MochiWeb - CVE-2012-5641
Published: March 18, 2014 / Updated: August 10, 2020
MochiWeb
CouchDB
MochiWeb
Detailed vulnerability description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1,. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a . (dot dot backslash) in the default URI.