diff options
author | tabthorpe <tabthorpe@FreeBSD.org> | 2008-07-04 22:37:36 +0800 |
---|---|---|
committer | tabthorpe <tabthorpe@FreeBSD.org> | 2008-07-04 22:37:36 +0800 |
commit | ce7ab95e4c20629bd1742d930e4595bcc44d1d6f (patch) | |
tree | d0df767e43fafb44696fcd9d01362ce00ea206a9 /security/vuxml | |
parent | 2e2254166fb154134729d215862b37d2581853eb (diff) | |
download | freebsd-ports-gnome-ce7ab95e4c20629bd1742d930e4595bcc44d1d6f.tar.gz freebsd-ports-gnome-ce7ab95e4c20629bd1742d930e4595bcc44d1d6f.tar.zst freebsd-ports-gnome-ce7ab95e4c20629bd1742d930e4595bcc44d1d6f.zip |
- Document py-pylons -- Path traversal bug
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8ad7449fe35a..33284a5b51fe 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f5c58fc1-49c0-11dd-b0ba-00163e000016"> + <topic>py-pylons -- Path traversal bug</topic> + <affects> + <package> + <name>py24-pylons</name> + <range><lt>0.9.6.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Pylons team reports:</p> + <blockquote cite="http://wiki.pylonshq.com/display/pylonsdocs/0.9.6.2"> + <p>The error.py controller uses paste.fileapp to serve the static + resources to the browser. The default error.py controller uses + os.path.join to combine the id from Routes with the media path. + Routes prior to 1.8 double unquoted the PATH_INFO, resulting in + FileApp returning files from the filesystem that can be outside + of the intended media path directory. + </p> + <p>An attacker can craft URL's which utilize the double escaping + to pass in a name to the error.py controller which contains a + leading slash thus escaping the intended media path and serving + files from any location on the filesystem that the Pylons + application has access to.</p> + </blockquote> + </body> + </description> + <references> + <url>http://wiki.pylonshq.com/display/pylonsdocs/0.9.6.2</url> + </references> + <dates> + <discovery>2008-05-28</discovery> + <entry>2008-07-04</entry> + </dates> + </vuln> + <vuln vid="4fb43b2f-46a9-11dd-9d38-00163e000016"> <topic>FreeType 2 -- Multiple Vulnerabilities</topic> <affects> |