SB2019062809 - Multiple vulnerabilities in web2py Sample Web Application
Published: June 28, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Hardcoded credentials (CVE-ID: CVE-2016-3953)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to presence of a hardcoded encryption key in the "session.connect" function call. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Deserialization of Untrusted Data (CVE-ID: CVE-2016-3957)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to the "secure_load" function in "gluon/utils.py" uses pickle.loads to deserialize session information stored in cookies. A remote attacker with knowledge of the encryption key (see vulnerability #1) can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Information disclosure (CVE-ID: CVE-2016-3954)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the software allows access to the "session_cookie_key" value if a request is made to the "examples/simple_examples/status" page. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
Remediation
Install update from vendor's website.