Vulnerabilities
Vulnerable Software
Cherrypy:  Security Vulnerabilities
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
CVSS Score
7.5
EPSS Score
0.027
Published
2008-01-12
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
CVSS Score
5.0
EPSS Score
0.008
Published
2006-02-22


Contact Us

Shodan ® - All rights reserved