{"id":"UBUNTU-CVE-2017-10974","details":"Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.","modified":"2025-07-16T08:12:47.094927Z","published":"2017-07-07T11:29:00Z","withdrawn":"2025-07-18T16:44:03Z","upstream":["CVE-2017-10974"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10974"},{"type":"REPORT","url":"http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt"},{"type":"REPORT","url":"https://www.exploit-db.com/exploits/42303/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-10974"}],"affected":[{"package":{"name":"yaws","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/yaws@1.98-2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.98-2"}]}],"versions":["1.96-3","1.97-1","1.97-2","1.98-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.98-2","binary_name":"erlang-yaws"},{"binary_version":"1.98-2","binary_name":"yaws"},{"binary_version":"1.98-2","binary_name":"yaws-chat"},{"binary_version":"1.98-2","binary_name":"yaws-doc"},{"binary_version":"1.98-2","binary_name":"yaws-mail"},{"binary_version":"1.98-2","binary_name":"yaws-wiki"},{"binary_version":"1.98-2","binary_name":"yaws-yapp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-10974.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}