Safety vulnerability ID: 35340
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Multiple cross-site scripting (XSS) vulnerabilities in the paste.httpexceptions implementation in Paste before 1.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving a 404 status code, related to (1) paste.urlparser.StaticURLParser, (2) paste.urlparser.PkgResourcesParser, (3) paste.urlmap.URLMap, and (4) HTTPNotFound.
Latest version: 3.10.1
Tools for using a Web Server Gateway Interface stack
Multiple cross-site scripting (XSS) vulnerabilities in the paste.httpexceptions implementation in Paste before 1.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving a 404 status code, related to (1) paste.urlparser.StaticURLParser, (2) paste.urlparser.PkgResourcesParser, (3) paste.urlmap.URLMap, and (4) HTTPNotFound.
MLIST:[oss-security] 20100629 CVE request: XSS in python paste: http://marc.info/?l=oss-security&m=127785414818815&w=2
MLIST:[oss-security] 20100630 Re: CVE request: XSS in python paste: http://marc.info/?l=oss-security&m=127792576822169&w=2
MLIST:[pylons-discuss] 20100624 Paste 1.7.4, security fix for XSS hole: http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain
CONFIRM:http://bitbucket.org/ianb/paste/changeset/fcae59df8b56: http://bitbucket.org/ianb/paste/changeset/fcae59df8b56
CONFIRM:http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole: http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole
CONFIRM:http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1: http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1
UBUNTU:USN-1026-1: http://www.ubuntu.com/usn/USN-1026-1
BID:41160: http://www.securityfocus.com/bid/41160
SECUNIA:42500: http://secunia.com/advisories/42500
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application