FreeBSD : py-pylons -- Path traversal bug (f5c58fc1-49c0-11dd-b0ba-00163e000016)

High Nessus Plugin ID 33420


The remote FreeBSD host is missing a security-related update.


Pylons team reports :

The controller uses paste.fileapp to serve the static resources to the browser. The default controller uses os.path.join to combine the id from Routes with the media path. Routes prior to 1.8 double unquoted the PATH_INFO, resulting in FileApp returning files from the filesystem that can be outside of the intended media path directory.

An attacker can craft URL's which utilize the double escaping to pass in a name to the controller which contains a leading slash thus escaping the intended media path and serving files from any location on the filesystem that the Pylons application has access to.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 33420

File Name: freebsd_pkg_f5c58fc149c011ddb0ba00163e000016.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2008/07/08

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py24-pylons, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2008/07/04

Vulnerability Publication Date: 2008/05/28