Lucene search

K
githubGitHub Advisory DatabaseGHSA-76X8-GG39-5JJG
HistoryMay 01, 2022 - 11:28 p.m.

CherryPy Malicious cookies allow access to files outside the session directory

2022-05-0123:28:42
CWE-22
GitHub Advisory Database
github.com
4
cherrypy
directory traversal
vulnerability
malicious cookies
session
remote attackers
file access

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.008

Percentile

81.5%

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

Affected configurations

Vulners
Node
cherrypycherrypyRange3.03.0.2
OR
cherrypycherrypyRange02.1.1
VendorProductVersionCPE
cherrypycherrypy*cpe:2.3:a:cherrypy:cherrypy:*:*:*:*:*:*:*:*

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.008

Percentile

81.5%