CherryPy < 2.1.1 staticfilter Directory Traversal Arbitrary File Access

medium Nessus Network Monitor Plugin ID 3442

Synopsis

The remote host is vulnerable to a Directory Traversal flaw.

Description

The remote host is running CherryPy, a web-based content management system written in python. This version of CherryPy is vulnerable to a directory traversal flaw. An attacker exploiting this flaw would send a malformed query to the application. Successful exploitation would result in the attacker being able to access confidential data outside of the web root directory.

Solution

Upgrade to version 2.1.1 or higher.

See Also

http://www.nessus.org/u?11e78d5a

http://www.cherrypy.org

Plugin Details

Severity: Medium

ID: 3442

Family: Web Servers

Published: 2/22/2006

Updated: 3/6/2019

Nessus ID: 20961

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cherrypy:cherrypy

Reference Information

CVE: CVE-2006-0847

BID: 16760