CWE
22
Advisory Published
CVE Published
Updated

CVE-2023-40587: Pyramid static view path traversal up one directory

First published: Fri Aug 25 2023(Updated: )

### Impact This impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory above the location of the static view's file system path. No further path traversal exists, and the only file that could be disclosed accidentally is `index.html`. Example: ``` config.add_static_view(name='static', path='/usr/src/app/static', cache_max_age=0) ``` And directory tree: ``` /usr/src/app \ | - static \ | - file.css | - index.html | - ... | - index.html <-- (this file could be disclosed with this bug) ``` ### Patches Pyramid now will reject any path that contains a null-byte out of caution. While valid in directory/file names, we would strongly consider it a mistake to use null-bytes in naming files/directories. Secondly, Python 3.11, and 3.12 has fixed the underlying issue in `os.path.normpath` to no longer truncate on the first `0x00` found, returning the behavior to pre-3.11 Python, un an as of yet unreleased version, see: - https://github.com/python/cpython/issues/106242 - https://github.com/python/cpython/pull/106816 At the time the following Python versions are not fixed: - Python 3.11.0 to 3.11.4 - Python 3.12.0a1 to 3.12.0rc1 Fixes will be available in: Python 3.12.0rc2 or 3.11.5. Please note that release candidates of Python are not production ready and should not be used for production workloads. ### Workarounds Use a version of Python 3 that is not affected. Downgrade to Python 3.10 series temporarily, or wait till Python 3.11.5 is released and upgrade to the latest version of Python 3.11 series. ### References - https://owasp.org/www-community/attacks/Path_Traversal - VN: JVN#41113329 - TN: JPCERT#93311166 ### Thanks - Masashi Yamane of LAC Co., Ltd

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Agendaless Pyramid>=2.0<2.0.2
pip/pyramid>=2.0.0<2.0.2
2.0.2
Fedoraproject Fedora=38
Fedoraproject Fedora=39

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this security issue?

    The vulnerability ID for this security issue is CVE-2023-40587.

  • What is the impact of this vulnerability?

    This vulnerability allows for path traversal, potentially exposing sensitive files and data.

  • Which versions of Pyramid are affected by this vulnerability?

    Pyramid versions 2.0 to 2.0.2 are affected by this vulnerability.

  • What is the severity rating of this vulnerability?

    This vulnerability has a severity rating of 5.3, which is considered medium.

  • How can I fix this vulnerability?

    To fix this vulnerability, upgrade to a version of Pyramid that is later than 2.0.2.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203