CVE-2019-25355

NameCVE-2019-25355
DescriptiongSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gsoap (PTS)bullseye2.8.104-3undetermined
bookworm2.8.124-2undetermined
trixie2.8.135-2undetermined
forky, sid2.8.139-1undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gsoapsource(unstable)undetermined

Notes

https://www.exploit-db.com/exploits/47653
check upstream status

Search for package or bug name: Reporting problems