ALT-PU-2023-4765-3
Closed vulnerabilities
Published: 2018-02-06
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-6758
The uwsgi_expand_path function in core/utils.c in Unbit uWSGI through 2.0.15 has a stack-based buffer overflow via a large directory length.
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html
- https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe
- https://lists.debian.org/debian-lts-announce/2018/02/msg00010.html
- http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html
- https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe
- https://lists.debian.org/debian-lts-announce/2018/02/msg00010.html
Published: 2018-02-26
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-7490
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html
- https://www.debian.org/security/2018/dsa-4142
- https://www.exploit-db.com/exploits/44223/
- https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.html
- https://www.debian.org/security/2018/dsa-4142
- https://www.exploit-db.com/exploits/44223/
Closed bugs
Переместить из /usr/sbin/ в /usr/bin