Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
CherryPy存在Cookie会话Id信息泄露漏洞
Vulnerability Description
CherryPy是Python编写的面向对象的HTTP框架。 CherryPy在处理Cookie数据时存在漏洞,远程攻击者可能利用此漏洞访问系统上的任意文件。 如果用户通过cookie提供了恶意的会话ID的话,且服务器在使用基于文件的会话,应用程序就可能引用会话目录之外的文件(文件名以SESSION_PREFIX开始)。
CVSS Information
N/A
Vulnerability Type
N/A