CherryPy < 2.1.1 staticfilter Directory Traversal Arbitrary File Access

Medium Nessus Network Monitor Plugin ID 3442

Synopsis

The remote host is vulnerable to a Directory Traversal flaw.

Description

The remote host is running CherryPy, a web-based content management system written in python. This version of CherryPy is vulnerable to a directory traversal flaw. An attacker exploiting this flaw would send a malformed query to the application. Successful exploitation would result in the attacker being able to access confidential data outside of the web root directory.

Solution

Upgrade to version 2.1.1 or higher.

See Also

http://www.nessus.org/u?11e78d5a

http://www.cherrypy.org

Plugin Details

Severity: Medium

ID: 3442

File Name: 3442.prm

Family: Web Servers

Published: 2006/02/22

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 20961

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2006-0847

BID: 16760