7.5
CVSSv2

CVE-2008-0252

Published: 12/01/2008 Updated: 15/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote malicious users to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.

Vulnerable Product Search on Vulmon Subscribe to Product

cherrypy cherrypy

Vendor Advisories

Debian Bug report logs - #461069 python-cherrypy: CVE-2008-0252 directory traversal vulnerability Package: python-cherrypy; Maintainer for python-cherrypy is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Source for python-cherrypy is src:python-cherrypy (PTS, buildd, popcon) Reported by: Nico Gold ...
It was discovered that a directory traversal vulnerability in CherryPy, a pythonic, object-oriented web development framework, may lead to denial of service by deleting files through malicious session IDs in cookies The old stable distribution (sarge) doesn't contain python-cherrypy For the stable distribution (etch), this problem has been fixed ...