Some vulnerabilities have been in Mongoose, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and cause a DoS (Denial of Service).
1) An error within the handling of HTTP requests can be exploited to disclose the source code of certain scripts (e.g. PHP) by appending "::$DATA" or "/" to a URI.
2) An error when handling HTTP requests containing 8.3 aliases (short file names) can be exploited to access normally restricted directories or disclose a script's source code.
3) An error exists when determining if a requested file should be handled as a script. This can be exploited to trigger the interpretation of e.g. ".phpx" files as ".php" scripts by requesting their 8.3 alias.
4) An error when handling certain HTTP requests can be exploited to access file outside of the web root via directory traversal attacks.
5) A signedness error in the "discard_current_request_from_buffer()" function can be exploited to cause the process to crash via a specially crafted web request with a negative value in the "Content-Length" header.
This vulnerability is confirmed in version 2.11.
The other vulnerabilities are confirmed in version 2.8. Other versions may also be affected.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Mongoose Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.