CGI directory traversal (URL parsing)

Warning

This resource is maintained for historical reference and does not contain the latest vulnerability info for Python.

The canonical database for vulnerabilities affecting Python is available on GitHub in the Open Source Vulnerability (OSV) format. This database can be viewed online at the Open Source Vulnerability Database.

An error in separating the path and filename of the CGI script to run in http.server.CGIHTTPRequestHandler allows running arbitrary executables in the directory under which the server was started.

Dates:

  • Disclosure date: 2013-10-29 (Python issue bpo-19435 reported)

Fixed In

Python issue

Directory traversal attack for CGIHTTPRequestHandler.

  • Python issue: bpo-19435
  • Creation date: 2013-10-29
  • Reporter: Alexander Kruppa

Timeline

Timeline using the disclosure date 2013-10-29 as reference: