Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <A9E43DB4-BC61-4297-96F0-09C699DC2DB6@rooftopsolutions.nl>
Date: Thu, 11 Apr 2013 15:12:51 +0200
From: Evert Pot <evert@...ftopsolutions.nl>
To: oss-security@...ts.openwall.com
Subject: SabreDAV security advisory (CVE-2013-1939)

# Local file exposure issue
Web: 
https://groups.google.com/forum/?fromgroups=#!topic/sabredav-discuss/ehOUu7wTSGQ


## CVE IDENTIFIERS
- CVE-2013-1939

## AFFECTED SOFTWARE
- SabreDAV < 1.6.8, < 1.7.6, < 1.8.4 running in Windows hosts. 

## DESCRIPTION

It was possible for authenticated users on to read any file on the local
filesystem, accessible by the webserver.

Thanks to Lukas Reschke for reporting this issue.

## RESOLUTION
Update to SabreDAV 1.6.9, 1.7.7 or 1.8.5 or turn off the 'Browser plugin'.

Zipballs:
http://code.google.com/p/sabredav/downloads/list

Or with composer:
composer update sabre/dav

Regards,
Evert Pot

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.