CVE-2021-32062

NameCVE-2021-32062
DescriptionMapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3 does not properly enforce the MS_MAP_NO_PATH and MS_MAP_PATTERN restrictions that are intended to control the locations from which a mapfile may be loaded (with MapServer CGI).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs988208

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mapserver (PTS)stretch7.0.4-2vulnerable
buster7.2.2-1vulnerable
bullseye7.6.2-1vulnerable
bookworm, sid7.6.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mapserversourceexperimental7.6.3-1~exp1
mapserversource(unstable)7.6.2-2988208

Notes

[bullseye] - mapserver <ignored> (Minor issue; #988224)
[buster] - mapserver <no-dsa> (Minor issue; will be fixed via point release)
[stretch] - mapserver <postponed> (Minor issue; can be fixed in next update)
https://github.com/mapserver/mapserver/issues/6313
https://github.com/MapServer/MapServer/pull/6314
https://github.com/mapserver/mapserver/commit/927ac97cb9ece305306b5ab2b5600d3afe8c1732 (branch-7-6)
https://github.com/mapserver/mapserver/commit/7db7cbb26b6bc6e651db268e9536836a56e6825a (branch-7-2)
https://github.com/mapserver/mapserver/commit/82a3eb5f6c8f75cedd095b909cc4990f3d8a99e1 (branch-7-0)
Fixed in 7.0.8, 7.2.3, 7.4.5, 7.6.3

Search for package or bug name: Reporting problems