Path Traversal: '.../...//'
CVE-2006-0847
Summary
Directory traversal vulnerability in the staticfilter component in CherryPy before 2.1.1 allows remote attackers to read arbitrary files via ".." sequences in unspecified vectors.
- LOW
- NETWORK
- NONE
- NONE
- PARTIAL
- NONE
CWE-35 - Path Traversal: '.../...//'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Advisory Timeline
- Published