CVE-2008-0252
Publication date 12 January 2008
Last updated 24 July 2024
Ubuntu priority
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
Status
Package | Ubuntu Release | Status |
---|---|---|
cherrypy3 | ||
python-cherrypy | ||
Patch details
Package | Patch details |
---|---|
python-cherrypy |