Safety vulnerability ID: 35548
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code.
Latest version: 0.13.2
Fast and simple WSGI-framework for small web-applications.
Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code.
MLIST:[oss-security] 20140501 Re: CVE request: Python Bottle JSON content-type not restrictive enough: http://www.openwall.com/lists/oss-security/2014/05/01/15
CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=1093255: https://bugzilla.redhat.com/show_bug.cgi?id=1093255
CONFIRM:https://github.com/defnull/bottle/issues/616: https://github.com/defnull/bottle/issues/616
DEBIAN:DSA-2948: http://www.debian.org/security/2014/dsa-2948
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application