{"id":"CVE-2008-0252","details":"Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.","aliases":["GHSA-76x8-gg39-5jjg","PYSEC-2008-3"],"modified":"2025-08-09T19:01:27Z","published":"2008-01-12T02:46:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/28353"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28354"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28611"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28620"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28769"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200801-11.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1481"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/0039"},{"type":"FIX","url":"http://www.cherrypy.org/changeset/1774"},{"type":"FIX","url":"http://www.cherrypy.org/changeset/1775"},{"type":"EVIDENCE","url":"http://www.cherrypy.org/changeset/1776"},{"type":"EVIDENCE","url":"http://www.cherrypy.org/ticket/744"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/487001/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/27181"},{"type":"WEB","url":"https://bugs.gentoo.org/show_bug.cgi?id=204829"},{"type":"WEB","url":"https://issues.rpath.com/browse/RPL-2127"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00240.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00297.html"}],"schema_version":"1.7.3"}