Package: python-cherrypy Version: 2.2.1-3 Severity: grave Tags: security patch
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for python-cherrypy. CVE-2008-0252[0]: | Directory traversal vulnerability in the _get_file_path function in | (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) | filter/sessionfilter.py in CherryPy 2.1, and (3) | filter/sessionfilter.py in CherryPy 2.x allows remote attackers to | create or delete arbitrary files, and possibly read and write portions | of arbitrary files, via a crafted session id in a cookie. You can find a patch for this on: http://www.cherrypy.org/changeset/1775 If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0252 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgp8fhAnGoUSs.pgp
Description: PGP signature