CVE-2015-823507.06.2017, 20:29Directory traversal vulnerability in Spiffy before 5.4.Path TraversalEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTPrimary7.5 HIGHNETWORKLOWNONECVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NBase ScoreCVSS 3.xEPSS ScorePercentile: UnknownAffected Products (NVD)VendorProductVersioncall-ccspiffy𝑥< 5.4𝑥= Vulnerable software versionsDebian ReleasesDebian ProductCodenamechickenbookworm5.3.0-1fixedbullseye5.2.0-2fixedjessieno-dsasid5.3.0-2fixedtrixie5.3.0-2fixedwheezyno-dsaUbuntu ReleasesUbuntu ProductCodenamechickenbionicnot-affectedfocalnot-affectedjammynot-affectedkineticnot-affectedlunarnot-affectedmanticnot-affectednoblenot-affectedtrustyignoredxenialneededCommon Weakness EnumerationCWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Referenceshttp://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commit%3Bh=edd4926bb4f4c97760a0e03b0d0e8210398fe967http://www.openwall.com/lists/oss-security/2015/11/18/25http://www.securityfocus.com/bid/77644https://lists.gnu.org/archive/html/chicken-announce/2015-11/msg00000.htmlhttp://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=commit%3Bh=edd4926bb4f4c97760a0e03b0d0e8210398fe967http://www.openwall.com/lists/oss-security/2015/11/18/25http://www.securityfocus.com/bid/77644https://lists.gnu.org/archive/html/chicken-announce/2015-11/msg00000.html