Vulnerability Description
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
CVSS Score
7.5
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unbit | Uwsgi | < 2.0.17 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.htmlVendor Advisory
- https://www.debian.org/security/2018/dsa-4142Third Party Advisory
- https://www.exploit-db.com/exploits/44223/Third Party AdvisoryVDB Entry
- https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.17.htmlVendor Advisory
- https://www.debian.org/security/2018/dsa-4142Third Party Advisory
- https://www.exploit-db.com/exploits/44223/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-7490?
CVE-2018-7490 is a vulnerability with a CVSS score of 7.5 (HIGH). uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
How severe is CVE-2018-7490?
CVE-2018-7490 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7490?
Check the references section above for vendor advisories and patch information. Affected products include: Unbit Uwsgi, Debian Debian Linux.