CVE-2012-5641
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0373 (3.7%)
Percentile: 88.0%
EPSS: 2026-05-06
Affects
apache:couchdbmochiweb_project:mochiwebTechnical description
Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI.
Published: 3/18/2014, 5:02:49 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://seclists.org/fulldisclosure/2013/Jan/81
- http://secunia.com/advisories/51765
- http://www.securityfocus.com/bid/57313
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81240
- https://github.com/melkote/mochiweb/commit/ac2bf
- https://github.com/mochi/mochiweb/issues/92
- http://seclists.org/fulldisclosure/2013/Jan/81
- http://secunia.com/advisories/51765