FreeBSD : py-pylons -- Path traversal bug (f5c58fc1-49c0-11dd-b0ba-00163e000016)

high Nessus Plugin ID 33420

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Pylons team reports :

The error.py controller uses paste.fileapp to serve the static resources to the browser. The default error.py controller uses os.path.join to combine the id from Routes with the media path. Routes prior to 1.8 double unquoted the PATH_INFO, resulting in FileApp returning files from the filesystem that can be outside of the intended media path directory.

An attacker can craft URL's which utilize the double escaping to pass in a name to the error.py controller which contains a leading slash thus escaping the intended media path and serving files from any location on the filesystem that the Pylons application has access to.

Solution

Update the affected package.

See Also

http://wiki.pylonshq.com/display/pylonsdocs/0.9.6.2

http://www.nessus.org/u?762d13b7

Plugin Details

Severity: High

ID: 33420

File Name: freebsd_pkg_f5c58fc149c011ddb0ba00163e000016.nasl

Version: 1.11

Type: local

Published: 7/8/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py24-pylons, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/4/2008

Vulnerability Publication Date: 5/28/2008