Vulnerability Description
Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perlbal | Perlbal | <= 1.60 |
Related Weaknesses (CWE)
References
- http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES
- http://secunia.com/advisories/29565Vendor Advisory
- http://www.vupen.com/english/advisories/2008/1045/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41540
- http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES
- http://secunia.com/advisories/29565Vendor Advisory
- http://www.vupen.com/english/advisories/2008/1045/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41540
FAQ
What is CVE-2008-1652?
CVE-2008-1652 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary...
How severe is CVE-2008-1652?
CVE-2008-1652 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1652?
Check the references section above for vendor advisories and patch information. Affected products include: Perlbal Perlbal.