Vulnerability Description
Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Mod Python | 3.2.7 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/19239PatchVendor Advisory
- http://securitytracker.com/id?1015764Patch
- http://svn.apache.org/viewcvs.cgi/httpd/mod_python/branches/3.2.x/NEWS?rev=37894
- http://www.cgisecurity.com/2006/02/07Patch
- http://www.modpython.org/fs_sec_warn.html
- http://www.securityfocus.com/bid/16916Patch
- http://www.vupen.com/english/advisories/2006/0768Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24965
- http://secunia.com/advisories/19239PatchVendor Advisory
- http://securitytracker.com/id?1015764Patch
- http://svn.apache.org/viewcvs.cgi/httpd/mod_python/branches/3.2.x/NEWS?rev=37894
- http://www.cgisecurity.com/2006/02/07Patch
- http://www.modpython.org/fs_sec_warn.html
- http://www.securityfocus.com/bid/16916Patch
- http://www.vupen.com/english/advisories/2006/0768Vendor Advisory
FAQ
What is CVE-2006-1095?
CVE-2006-1095 is a vulnerability with a CVSS score of 7.2 (HIGH). Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
How severe is CVE-2006-1095?
CVE-2006-1095 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1095?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Mod Python.