|
|||
Rule General Information |
---|
Release Date: | 2018-06-19 | |
Rule Name: | Nginx Location NTFS Extended Attributes Security Policy Bypass Vulnerability (CVE-2010-2731 CVE-2011-4963) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request. | |
Impact: | An attacker can take advantage of the vulnerability to bypass the security policy implemented by the software administrator, and perform unauthorized actions to the target system. | |
Affected OS: | Windows | |
Reference: | http://english.securitylab.ru/lab/PT-2012-06 http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html http://nginx.org/en/security_advisories.html |
|
Solutions |
---|
Upgrade to 1.2.1 or 1.3.1 to solve the problem. |