Описание
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | 3.0.2-2 |
| edgy | DNE | |
| feisty | DNE | |
| gutsy | released | 3.0.2-1ubuntu0.1 |
| hardy | not-affected | 3.0.2-2 |
| intrepid | not-affected | 3.0.2-2 |
| upstream | needed |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | not-affected | |
| devel | not-affected | 2.2.1-3.1 |
| edgy | ignored | end of life, was needed |
| feisty | released | 2.2.1-3ubuntu1.7.04 |
| gutsy | released | 2.2.1-3ubuntu1.7.10 |
| hardy | not-affected | 2.2.1-3.1 |
| intrepid | not-affected | 2.2.1-3.1 |
| upstream | needed |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
Directory traversal vulnerability in the _get_file_path function in (1 ...
CherryPy Malicious cookies allow access to files outside the session directory
EPSS
7.5 High
CVSS2