Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-0252

Published: 12 January 2008

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

Priority

Medium

Status

Package Release Status
cherrypy3
Launchpad, Ubuntu, Debian
dapper Does not exist

edgy Does not exist

feisty Does not exist

gutsy
Released (3.0.2-1ubuntu0.1)
hardy Not vulnerable
(3.0.2-2)
intrepid Not vulnerable
(3.0.2-2)
upstream Needed

python-cherrypy
Launchpad, Ubuntu, Debian
dapper Not vulnerable

edgy Ignored
(end of life, was needed)
feisty
Released (2.2.1-3ubuntu1.7.04)
gutsy
Released (2.2.1-3ubuntu1.7.10)
hardy Not vulnerable
(2.2.1-3.1)
intrepid Not vulnerable
(2.2.1-3.1)
upstream Needed

Patches:
vendor: http://www.debian.org/security/2008/dsa-1481