Bug ID 1177354
Summary VUL-0: CVE-2020-25623: erlang: Erlang/OTP: allows attackers to read arbitrary files via a crafted HTTP request
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.3
Hardware Other
URL https://smash.suse.de/issue/268687/
OS Other
Status NEW
Severity Minor
Priority P5 - None
Component Security
Assignee matwey.kornilov@gmail.com
Reporter rfrohl@suse.com
QA Contact security-team@suse.de
CC cloud-bugs@suse.de
Found By Security Response Team
Blocker ---

rh#1885311

Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory
Traversal. An attacker can send a crafted HTTP request to read arbitrary files,
if httpd in the inets application is used.

Reference:
https://github.com/erlang/otp/releases/tag/OTP-23.1

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1885311
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25623
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25623.html
https://github.com/erlang/otp/releases/tag/OTP-23.1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25623
https://www.erlang.org/downloads
https://www.erlang.org/news


You are receiving this mail because: