DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152

Apache 1.3.29 and below directory traversal vulnerability





------- Additional Comments From [EMAIL PROTECTED]  2004-02-04 16:44 -------
the attched patch implements an cygwin specific as_os_canonical_filename() 
within src/os/cygwin/util_cygwin.c to map backslashes (that unfortunatly are 
interpreted by the cygwin os layer) to slashes. This allows the later security 
holders to grap within the directory_walk() and file_walk() routines.

Please review and apply. Update bug to fixed then.

stipe

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to