|Title:||CherryPy StaticFilter Directory Traversal|
The remote system is powered by CherryPy which
according to its version number is vulnreable to
a directory traversal attack as a result of insufficient
filtering of requests that pass through the
'staticFilter' module. Attackers can as a result view
arbitrary files on tthe system.
Versions prior to 2.1.1 are vulnerable.
Solution: Upgrade to version 2.1.1 or later.
Risk factor : Medium
BugTraq ID: 16760|
Common Vulnerability Exposure (CVE) ID: CVE-2006-0847
XForce ISS Database: cherrypy-staticfilter-directory-traversal(24809)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.