vendor:
uWSGI PHP Plugin
by:
Marios Nicolaides - RUNESEC
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: uWSGI PHP Plugin
Affected Version From: uWSGI PHP Plugin before 2.0.17
Affected Version To: uWSGI PHP Plugin before 2.0.17
Patch Exists: YES
Related CWE: CVE-2018-7490
CPE: uwsgi
Other Scripts:
N/A
Platforms Tested: uWSGI 2.0.12 and 2.0.15
2018
uWSGI PHP Plugin Directory Traversal
The uWSGI PHP plugin before 2.0.17 is vulnerable to Directory Traversal when used without specifying the "php-allowed-docroot" option. The vulnerability exists due to improper validation of the file path when requesting a resource under the DOCUMENT_ROOT directory which is specified via "php-docroot". A remote attacker could exploit this weakness to read arbitrary files from the vulnerable system using path traversal sequences ("..%2f").
Mitigation:
The vulnerability can be mitigated by specifying the "php-allowed-docroot" option when using the uWSGI PHP plugin.