Package: python-cherrypy
Severity: grave
Tags: security
Justification: user security hole


Cite:
Directory traversal vulnerability in the staticfilter component in
CherryPy before 2.1.1 allows remote attackers to read arbitrary files
via ".." sequences in unspecified vectors.

http://www.securityfocus.com/bid/16760 claims this also affects cherrypy 2.0.
If this is true, it should be fixed as well (see #353542 for 2.1).

Please mention the CVE number in the changelog.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to