CherryPy < 2.1.1 staticfilter Directory Traversal Arbitrary File Access

Medium Nessus Network Monitor Plugin ID 3442


The remote host is vulnerable to a Directory Traversal flaw.


The remote host is running CherryPy, a web-based content management system written in python. This version of CherryPy is vulnerable to a directory traversal flaw. An attacker exploiting this flaw would send a malformed query to the application. Successful exploitation would result in the attacker being able to access confidential data outside of the web root directory.


Upgrade to version 2.1.1 or higher.

See Also

Plugin Details

Severity: Medium

ID: 3442

File Name: 3442.prm

Family: Web Servers

Published: 2006/02/22

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 20961

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 4.9


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2006-0847

BID: 16760