{"id":"CVE-2016-3952","details":"web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify.  NOTE: this issue can be leveraged by remote attackers to gain administrative access.","modified":"2026-04-10T03:49:43.025204Z","published":"2018-02-06T18:29:00.213Z","references":[{"type":"WEB","url":"https://usn.ubuntu.com/4030-1/"},{"type":"ADVISORY","url":"https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40"},{"type":"EVIDENCE","url":"https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/web2py/web2py","events":[{"introduced":"0"},{"fixed":"973bb4a16f90931588e01b644498f34f6d077377"},{"fixed":"9706d125b42481178d2b423de245f5d2faadbf40"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.14.1"}]}}],"versions":["R-2.10.1","R-2.10.2","R-2.10.3","R-2.10.4","R-2.10.4.beta","R-2.11.1","R-2.11.2","R-2.12.1","R-2.12.2","R-2.12.3","R-2.13.1","R-2.13.2","R-2.13.3","R-2.13.4","R-2.4.2","R-2.4.3","R-2.4.4","R-2.4.5","R-2.4.6","R-2.4.7","R-2.5.1","R-2.6.1","R-2.6.2","R-2.6.3","R-2.6.4","R-2.7.1","R-2.7.2","R-2.7.3","R-2.7.4","R-2.8.1","R-2.8.2","R-2.9.10","R-2.9.11","R-2.9.12","R-2.9.2","R-2.9.3","R-2.9.4","R-2.9.5","R-2.9.6","R-2.9.7","R-2.9.8","R-2.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3952.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}