GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Jan 27, 2008 5:26 pm Post subject: [ GLSA 200801-11 ] CherryPy: Directory traversal vulnerabili |
|
|
Gentoo Linux Security Advisory
Title: CherryPy: Directory traversal vulnerability (GLSA 200801-11)
Severity: normal
Exploitable: remote
Date: January 27, 2008
Bug(s): #204829
ID: 200801-11
Synopsis
CherryPy is vulnerable to a directory traversal that could allow attackers to read and write arbitrary files.
Background
CherryPy is a Python-based, object-oriented web development framework.
Affected Packages
Package: dev-python/cherrypy
Vulnerable: < 3.0.2-r1
Unaffected: >= 2.2.1-r2 < 2.2.2
Unaffected: >= 3.0.2-r1
Architectures: All supported architectures
Description
CherryPy does not sanitize the session id, provided as a cookie value, in the FileSession._get_file_path() function before using it as part of the file name.
Impact
A remote attacker could exploit this vulnerability to read and possibly write arbitrary files on the web server, or to hijack valid sessions, by providing a specially crafted session id. This only affects applications using file-based sessions.
Workaround
Disable the "FileSession" functionality by using "PostgresqlSession" or "RamSession" session management in your CherryPy application.
Resolution
All CherryPy 2.2 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.2.1-r2" | All CherryPy 3.0 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/cherrypy-3.0.2-r1" |
References
CVE-2008-0252 |
|