CVE-2016-3954
Published on: 02/06/2018 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:02 PM UTC
Certain versions of Web2py from Web2py contain the following vulnerability:
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
- CVE-2016-3954 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
LOCAL | LOW | LOW | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 2.1 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
WEB2PY 反序列化的安全問題-CVE-2016-3957 | DEVCORE 戴夫寇爾 | Exploit Technical Description Third Party Advisory devco.re text/html |
![]() |
USN-4030-1: web2py vulnerabilities | Ubuntu security notices | Ubuntu | usn.ubuntu.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Web2py | Web2py | All | All | All | All |
Application | Web2py | Web2py | All | All | All | All |
- cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*:
- cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE