Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46697
HistoryApr 30, 2024 - 10:09 a.m.

Directory Traversal

2024-04-3010:09:36
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
6
cherrypy
input validation
remote attackers
cookies
arbitrary files

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.008

Percentile

81.5%

cherryPy is vulnerable to Directory Traversal. The vulnerability is due to improper input validation in the get_file_path function, allowing remote attackers to manipulate session IDs in cookies to create, delete, or possibly read and write arbitrary files.

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.1

Confidence

Low

EPSS

0.008

Percentile

81.5%