Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-0252

Опубликовано: 12 янв. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

3.0.2-2
edgy

DNE

feisty

DNE

gutsy

released

3.0.2-1ubuntu0.1
hardy

not-affected

3.0.2-2
intrepid

not-affected

3.0.2-2
upstream

needed

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

2.2.1-3.1
edgy

ignored

end of life, was needed
feisty

released

2.2.1-3ubuntu1.7.04
gutsy

released

2.2.1-3ubuntu1.7.10
hardy

not-affected

2.2.1-3.1
intrepid

not-affected

2.2.1-3.1
upstream

needed

Показывать по

Ссылки на источники

EPSS

Процентиль: 82%
0.01961
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 18 лет назад

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

debian
почти 18 лет назад

Directory traversal vulnerability in the _get_file_path function in (1 ...

CVSS3: 7.5
github
больше 3 лет назад

CherryPy Malicious cookies allow access to files outside the session directory

EPSS

Процентиль: 82%
0.01961
Низкий

7.5 High

CVSS2