Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-76x8-gg39-5jjg

Опубликовано: 01 мая 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

CherryPy Malicious cookies allow access to files outside the session directory

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

Пакеты

Наименование

cherrypy

pip
Затронутые версииВерсия исправления

< 2.1.1

2.1.1

Наименование

cherrypy

pip
Затронутые версииВерсия исправления

>= 3.0, < 3.0.2

3.0.2

EPSS

Процентиль: 83%
0.01961
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 18 лет назад

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

nvd
почти 18 лет назад

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

debian
почти 18 лет назад

Directory traversal vulnerability in the _get_file_path function in (1 ...

EPSS

Процентиль: 83%
0.01961
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-22