Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0847

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-0847
Last Modified 07 Mar 2011 09:30:54
Published 21 Feb 2006 09:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0847

Summary

Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.

Vulnerable Systems

Application

  • Cherrypy 0.1

  • Cherrypy 0.10

  • Cherrypy 0.10 Beta

  • Cherrypy 0.10 Rc1

  • Cherrypy 0.2

  • Cherrypy 0.3

  • Cherrypy 0.4

  • Cherrypy 0.5

  • Cherrypy 0.6

  • Cherrypy 0.7

  • Cherrypy 0.8

  • Cherrypy 0.8 Beta

  • Cherrypy 0.9

  • Cherrypy 0.9 Beta

  • Cherrypy 0.9 Gamma

  • Cherrypy 0.9 Rc1

  • Cherrypy 2.0.0

  • Cherrypy 2.0.0a1

  • Cherrypy 2.1.0

  • Cherrypy 2.1.0 Beta

  • Cherrypy 2.1.0 Rc1

  • Cherrypy 2.1.0 Rc2


References

XF - cherrypy-staticfilter-directory-traversal(24809)

BID - 16760

CONFIRM - http://groups.google.com/group/cherrypy-announce/browse_thread/thread/92b2972f774fe6df/2f63afc9433dc306#2f63afc9433dc306

VUPEN - ADV-2006-0677

CONFIRM - http://sourceforge.net/project/shownotes.php?release_id=384316&group_id=56099

GENTOO - GLSA-200605-16

CONFIRM - http://www.cherrypy.org/

SECUNIA - 20344

SECUNIA - 18944


Last Updated: 27 May 2016 10:41:49