From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200605-16.xml | 63 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 63 insertions(+) create mode 100644 metadata/glsa/glsa-200605-16.xml (limited to 'metadata/glsa/glsa-200605-16.xml') diff --git a/metadata/glsa/glsa-200605-16.xml b/metadata/glsa/glsa-200605-16.xml new file mode 100644 index 000000000000..8fa37684c932 --- /dev/null +++ b/metadata/glsa/glsa-200605-16.xml @@ -0,0 +1,63 @@ + + + + CherryPy: Directory traversal vulnerability + + CherryPy is vulnerable to a directory traversal that could allow attackers + to read arbitrary files. + + cherrypy + 2006-05-30 + 2006-05-30: 01 + 134273 + remote + + + 2.1.1 + 2.1.1 + + + +

+ CherryPy is a Python-based, object-oriented web development + framework. +

+
+ +

+ Ivo van der Wijk discovered that the "staticfilter" component of + CherryPy fails to sanitize input correctly. +

+
+ +

+ An attacker could exploit this flaw to obtain arbitrary files from + the web server. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All CherryPy users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.1.1" +
+ + CVE-2006-0847 + + + DerCorny + + + DerCorny + + + DerCorny + +
-- cgit v1.2.3