Hi. I just released a security update for mathopd. (mathopd 1.5p7)

The problem:

If you use the * construct in your config, as in

 Control {
    Alias /
    Location /var/www/*

then the * will be substituted with the value of the Host header that was supplied by the client. However this occurs after path translation, and without input verification could lead to directory traversal, exposing files outside of /var/www.

If you are still using Mathopd, and use the * feature, you should upgrade as soon as possible.

If you do not use the * feature, than you are not at risk. But you may still want to upgrade.

Vulnerable versions of the software: all 1.4 versions, and all 1.5 versions prior to 1.5p7

Thanks to Mateusz Goik for pointing this out.


Reply via email to