Description
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote attackers to create or delete arbitrary files, and possibly read and write portions of arbitrary files, via a crafted session id in a cookie.
Remediation
References
Related Vulnerabilities
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1831)
WordPress Plugin 10Web Map Builder for Google Maps Cross-Site Scripting (1.0.71)
Jenkins Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2020-2101)
Ext JS Server-Side Request Forgery (SSRF) Vulnerability (CVE-2007-6758)