PyBlosxom before 1.3.2, when running on certain...
Moderate severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Jan 31, 2023
Description
Published by the National Vulnerability Database
Feb 15, 2006
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Jan 31, 2023
PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.
References