~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2016-3952

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2016-3952
2
 
PublicDate: 2018-02-06
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3952
5
 
 https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957/
6
 
 https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40
7
 
Description:
8
 
 web2py before 2.14.1, when using the standalone version, allows remote
9
 
 attackers to obtain environment variable values via a direct request to
10
 
 examples/template_examples/beautify.  NOTE: this issue can be leveraged by
11
 
 remote attackers to gain administrative access.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
Priority: untriaged
16
 
Discovered-by:
17
 
Assigned-to:
18
 
 
19
 
 
20
 
Patches_web2py:
21
 
upstream_web2py: needs-triage
22
 
precise/esm_web2py: DNE
23
 
trusty_web2py: needs-triage
24
 
xenial_web2py: needs-triage
25
 
artful_web2py: needs-triage
26
 
bionic_web2py: DNE
27
 
devel_web2py: DNE