Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19239 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1015764 - Patch | |
References | () http://svn.apache.org/viewcvs.cgi/httpd/mod_python/branches/3.2.x/NEWS?rev=378945 - | |
References | () http://www.cgisecurity.com/2006/02/07 - Patch | |
References | () http://www.modpython.org/fs_sec_warn.html - | |
References | () http://www.securityfocus.com/bid/16916 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0768 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24965 - |
Information
Published : 2006-03-09 13:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1095
Mitre link : CVE-2006-1095
CVE.ORG link : CVE-2006-1095
JSON object : View
Products Affected
apache
- mod_python
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')