Package: python-cherrypy
Version: 2.2.1-3
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for python-cherrypy.

CVE-2008-0252[0]:
| Directory traversal vulnerability in the _get_file_path function in
| (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2)
| filter/sessionfilter.py in CherryPy 2.1, and (3)
| filter/sessionfilter.py in CherryPy 2.x allows remote attackers to
| create or delete arbitrary files, and possibly read and write portions
| of arbitrary files, via a crafted session id in a cookie.

You can find a patch for this on:
http://www.cherrypy.org/changeset/1775

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp8fhAnGoUSs.pgp
Description: PGP signature

Reply via email to