Security Advisories (1)
CVE-2008-1652 (2008-04-02)

Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.

NAME

Perlbal - Reverse-proxy load balancer and webserver

DESCRIPTION

For now, see example configuration files in conf/

AUTHORS

Brad Fitzpatrick, <brad@danga.com>
Mark Smith, <marksmith@danga.com>

SEE ALSO

http://www.danga.com/perlbal/

COPYRIGHT AND LICENSE

Copyright 2004, Danga Interactice, Inc. Copyright 2005-2006, Six Apart, Ltd.

You can use and redistribute Perlbal under the same terms as Perl itself.