CherryPy Malicious cookies allow access to files outside the session directory
High severity
GitHub Reviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published by the National Vulnerability Database
Jan 12, 2008
Published to the GitHub Advisory Database
May 1, 2022
Reviewed
Apr 1, 2024
Last updated
Sep 13, 2024
Directory traversal vulnerability in the _get_file_path function in (1)
lib/sessions.py
in CherryPy 3.0.x up to 3.0.2, (2)filter/sessionfilter.py
in CherryPy 2.1, and (3)filter/sessionfilter.py
in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.References