summaryrefslogtreecommitdiff
blob: c817a168cb361c98c73b2481a102337a37470f92 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200701-12">
  <title>Mono: Information disclosure</title>
  <synopsis>
    Mono does not properly sanitize pathnames allowing unauthorized information
    disclosure.
  </synopsis>
  <product type="ebuild">mono</product>
  <announced>2007-01-16</announced>
  <revised count="02">2007-01-17</revised>
  <bug>159886</bug>
  <access>remote</access>
  <affected>
    <package name="dev-lang/mono" auto="yes" arch="*">
      <unaffected range="ge">1.2.2.1</unaffected>
      <vulnerable range="lt">1.2.2.1</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Mono provides the necessary software to develop and run .NET client and
    server applications on various platforms.
    </p>
  </background>
  <description>
    <p>
    Jose Ramon Palanco has discovered that the System.Web class in the XSP
    for the ASP.NET server 1.1 through 2.0 in Mono does not properly
    validate or sanitize local pathnames which could allow server-side file
    content disclosure.
    </p>
  </description>
  <impact type="low">
    <p>
    An attacker could append a space character to a URI and obtain
    unauthorized access to the source code of server-side files. An
    attacker could also read credentials by requesting Web.Config%20 from a
    Mono server.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Mono users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=dev-lang/mono-1.2.2.1"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6104">CVE-2006-6104</uri>
  </references>
  <metadata tag="requester" timestamp="2007-01-14T18:42:16Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2007-01-14T21:54:13Z">
    falco
  </metadata>
  <metadata tag="submitter" timestamp="2007-01-15T00:17:42Z">
    shellsage
  </metadata>
</glsa>