Vulnerability Description
web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Web2Py | Web2Py | < 2.14.1 |
Related Weaknesses (CWE)
References
- https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957ExploitTechnical DescriptionThird Party Advisory
- https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40Third Party Advisory
- https://usn.ubuntu.com/4030-1/
- https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957ExploitTechnical DescriptionThird Party Advisory
- https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40Third Party Advisory
- https://usn.ubuntu.com/4030-1/
FAQ
What is CVE-2016-3952?
CVE-2016-3952 is a vulnerability with a CVSS score of 7.8 (HIGH). web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue ca...
How severe is CVE-2016-3952?
CVE-2016-3952 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3952?
Check the references section above for vendor advisories and patch information. Affected products include: Web2Py Web2Py.