Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704142
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-4142-1)
Summary:The remote host is missing an update for the Debian 'uwsgi' package(s) announced via the DSA-4142-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'uwsgi' package(s) announced via the DSA-4142-1 advisory.

Vulnerability Insight:
Marios Nicolaides discovered that the PHP plugin in uWSGI, a fast, self-healing application container server, does not properly handle a DOCUMENT_ROOT check during use of the --php-docroot option, allowing a remote attacker to mount a directory traversal attack and gain unauthorized read access to sensitive files located outside of the web root directory.

For the oldstable distribution (jessie), this problem has been fixed in version 2.0.7-1+deb8u2. This update additionally includes the fix for CVE-2018-6758 which was aimed to be addressed in the upcoming jessie point release.

For the stable distribution (stretch), this problem has been fixed in version 2.0.14+20161117-3+deb9u2.

We recommend that you upgrade your uwsgi packages.

For the detailed security status of uwsgi please refer to its security tracker page at: [link moved to references]

Affected Software/OS:
'uwsgi' package(s) on Debian 8, Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-7490
Debian Security Information: DSA-4142 (Google Search)
https://www.debian.org/security/2018/dsa-4142
https://www.exploit-db.com/exploits/44223/
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.