CherryPy: Directory traversal vulnerability — GLSA 200605-16

CherryPy is vulnerable to a directory traversal that could allow attackers to read arbitrary files.

Affected packages

dev-python/cherrypy on all architectures
Affected versions < 2.1.1
Unaffected versions >= 2.1.1

Background

CherryPy is a Python-based, object-oriented web development framework.

Description

Ivo van der Wijk discovered that the "staticfilter" component of CherryPy fails to sanitize input correctly.

Impact

An attacker could exploit this flaw to obtain arbitrary files from the web server.

Workaround

There is no known workaround at this time.

Resolution

All CherryPy users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.1.1"

References

Release date
May 30, 2006

Latest revision
May 30, 2006: 01

Severity
low

Exploitable
remote

Bugzilla entries