forwarded 323919 [EMAIL PROTECTED]
tag 323919 + upstream
thanks
Taco IJsselmuiden <[EMAIL PROTECTED]> reports:
the script 'http' uses '/../../../' as an exploit-pattern.
This causes things like '/dat/cjf/00/20/38/13.js' to match (which aren't
exploits).
attached patch changes this to '/\.\./\.\./\.\./' which fixes this
problem.
Should the 3 lines below also get fixed? An (avoidable) false positive seems
unlikely, but still possible.
Willi
PS: Please CC: the bug <[EMAIL PROTECTED]> on replies. thank you.
diff -ur logwatch-6.1.2.debian/scripts/services/http logwatch-6.1.2/scripts/services/http
--- logwatch-6.1.2.debian/scripts/services/http 2005-06-14 07:16:17.000000000 +0200
+++ logwatch-6.1.2/scripts/services/http 2005-08-19 09:54:52.209780234 +0200
@@ -250,7 +250,7 @@
#
my @exploits = (
'null',
- '/../../../',
+ '/\.\./\.\./\.\./',
'../../config.sys',
'/../../../autoexec.bat',
'/../../windows/user.dat',