DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152 Apache 1.3.29 and below directory traversal vulnerability ------- Additional Comments From [EMAIL PROTECTED] 2004-02-04 16:44 ------- the attched patch implements an cygwin specific as_os_canonical_filename() within src/os/cygwin/util_cygwin.c to map backslashes (that unfortunatly are interpreted by the cygwin os layer) to slashes. This allows the later security holders to grap within the directory_walk() and file_walk() routines. Please review and apply. Update bug to fixed then. stipe --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
