Vulnerability identifier: #VU80042
Vulnerability risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-40587
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
pyramid
Web applications /
CMS
Vendor: Pylons Project
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing null-byte characters. A remote attacker can disclose content of "index.html" file exactly one directory above the location of the static view's file system path.
Mitigation
Install update from vendor's website.
Vulnerable software versions
pyramid: 2.0 - 2.0.1
External links
https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/106816
https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.