Access Restriction Bypass The advisory has been revoked - it doesn't affect any version of package libplack-perl  (opens in a new tab)


Threat Intelligence

EPSS
0.53% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1504-LIBPLACKPERL-630429
  • published4 Sept 2014
  • disclosed4 Sept 2014

Introduced: 4 Sep 2014

CVE-2014-5269  (opens in a new tab)
CWE-264  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:15.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libplack-perl package and not the libplack-perl package as distributed by Ubuntu.

Plack::App::File in Plack before 1.0031 removes trailing slash characters from paths, which allows remote attackers to bypass the whitelist of generated files and obtain sensitive information via a crafted path, related to Plack::Middleware::Static.