CVE-2011-2191
https://notcve.org/view.php?id=CVE-2011-2191
Cross-site request forgery (CSRF) vulnerability in Cherokee-admin in Cherokee before 1.2.99 allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences, as demonstrated by a crafted nickname field to vserver/apply. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en Cherokee-admin de Cherokee en versiones anteriores a la 1.2.99. Permite a atacantes remotos secuestrar la autenticación de administradores en peticiones que insertan secuencias de comandos en sitios cruzados (XSS), como se ha demostrado por un campo de nombre de usuario ("nickname") a vserver/apply. • http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html http://osvdb.org/72693 http://seclists.org/fulldisclosure/2011/Jun/0 http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz http://www.openwall.com/lists/oss-security/2011/06/02/2 http://www.openwall.com/lists/oss-security/2011/06/03/6 http://www.openwall.com/lists/oss-security/2011/06/06/22 http://www.securityfocus.com/bid/49772 https://bugzilla • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2011-2190
https://notcve.org/view.php?id=CVE-2011-2190
The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack. La función generate_admin_password de Cherokee en versiones anteriores a la 1.2.99 utiliza la fecha y el PID para crear la semilla del generador de números aleatorios, lo que facilita a usuarios locales determinar la contraseña de admin a través de ataque de fuerza bruta. • http://code.google.com/p/cherokee/issues/detail?id=1212 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz http://www.openwall.com/lists/oss-security/2011/06/03/4 http://www.openwall.com/lists/oss-security/2011/06/06/21 http://www.securityfocus.com/bid/49772 https://bugzilla.redhat.com/show_bug.cgi?id=713304 • CWE-310: Cryptographic Issues •
CVE-2009-4489 – Cherokee 0.99.30 - Terminal Escape Sequence in Logs Command Injection
https://notcve.org/view.php?id=CVE-2009-4489
header.c in Cherokee before 0.99.32 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. header.c en Cherokee anterior a v0.99.32, escribe datos en un archivo de los sin depurar los caracteres no escribibles, lo que podría permitir a atacantes remotos modificar la ventana de título, o posiblemente ejecutar comandos de su elección o sobrescribir archivos, a través de una petición HTTP que contiene una secuencia de escape para el emulador de terminal. Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa are subject to log escape sequence injection vulnerabilities. • https://www.exploit-db.com/exploits/33501 http://secunia.com/advisories/37933 http://svn.cherokee-project.com/changeset/3944 http://svn.cherokee-project.com/changeset/3977 http://www.securityfocus.com/archive/1/508830/100/0/threaded http://www.securityfocus.com/bid/37715 http://www.ush.it/team/ush/hack_httpd_escape/adv.txt http://www.vupen.com/english/advisories/2010/0090 • CWE-20: Improper Input Validation •
CVE-2009-4587 – Cherokee Web server 0.5.4 - Denial of Service
https://notcve.org/view.php?id=CVE-2009-4587
Cherokee Web Server 0.5.4 allows remote attackers to cause a denial of service (daemon crash) via an MS-DOS reserved word in a URI, as demonstrated by the AUX reserved word. Cherokee Web Server v0.5.4 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una palabra reservada de MS-DOS en una URI, como se ha demostrado en la palabra reservada AUX. • https://www.exploit-db.com/exploits/9874 http://www.securityfocus.com/archive/1/507456/100/0/threaded http://www.securityfocus.com/archive/1/507651/100/0/thread http://www.securityfocus.com/bid/36814 http://www.securitytracker.com/id?1023095 http://xc0re.wordpress.com/2009/10/25/cherokee-web-server-0-5-4-denial-of-service https://exchange.xforce.ibmcloud.com/vulnerabilities/53957 •
CVE-2009-3902 – Cherokee 0.5.4 - Directory Traversal
https://notcve.org/view.php?id=CVE-2009-3902
Directory traversal vulnerability in Cherokee Web Server 0.5.4 and earlier for Windows allows remote attackers to read arbitrary files via a /\.. (slash backslash dot dot) in the URL. Vulnerabilidad de salto de directorio en Cherokee Web Server v0.5.4 y anteriores para Windows permite a atacantes remotos leer ficheros de su elección mediante una secuencia de caracteres /\.. (barra barra invertida punto punto) en la URL. • https://www.exploit-db.com/exploits/9873 http://freetexthost.com/ncyss3plli http://osvdb.org/59588 http://pocoftheday.blogspot.com/2009/10/cherokee-web-server-054-directory.html http://secunia.com/advisories/37183 http://www.securityfocus.com/bid/36874 http://www.vupen.com/english/advisories/2009/3091 https://exchange.xforce.ibmcloud.com/vulnerabilities/54024 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •