CVE-2008-0252
Published: 12 January 2008
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
Priority
Status
Package | Release | Status |
---|---|---|
cherrypy3 Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
edgy |
Does not exist
|
|
feisty |
Does not exist
|
|
gutsy |
Released
(3.0.2-1ubuntu0.1)
|
|
hardy |
Not vulnerable
(3.0.2-2)
|
|
intrepid |
Not vulnerable
(3.0.2-2)
|
|
upstream |
Needed
|
|
python-cherrypy Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Released
(2.2.1-3ubuntu1.7.04)
|
|
gutsy |
Released
(2.2.1-3ubuntu1.7.10)
|
|
hardy |
Not vulnerable
(2.2.1-3.1)
|
|
intrepid |
Not vulnerable
(2.2.1-3.1)
|
|
upstream |
Needed
|
|
Patches: vendor: http://www.debian.org/security/2008/dsa-1481 |