Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2023-22970
Disclosure Date: May 26, 2023 (last updated October 08, 2023)
Bottles before 51.0 mishandles YAML load, which allows remote code execution via a crafted file.
0
Attacker Value
Unknown
CVE-2014-125065
Disclosure Date: January 07, 2023 (last updated October 08, 2023)
A vulnerability, which was classified as critical, was found in john5223 bottle-auth. Affected is an unknown function. The manipulation leads to sql injection. The name of the patch is 99cfbcc0c1429096e3479744223ffb4fda276875. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217632.
0
Attacker Value
Unknown
CVE-2022-31799
Disclosure Date: June 02, 2022 (last updated October 07, 2023)
Bottle before 0.12.20 mishandles errors during early request binding.
0
Attacker Value
Unknown
CVE-2020-36009
Disclosure Date: June 03, 2021 (last updated November 28, 2024)
OBottle 2.0 in \c\g.php contains an arbitrary file download vulnerability.
0
Attacker Value
Unknown
CVE-2020-36008
Disclosure Date: June 03, 2021 (last updated November 28, 2024)
OBottle 2.0 in \c\t.php contains an arbitrary file write vulnerability.
0
Attacker Value
Unknown
CVE-2020-28473
Disclosure Date: January 18, 2021 (last updated February 22, 2025)
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
0
Attacker Value
Unknown
CVE-2016-9964
Disclosure Date: December 16, 2016 (last updated November 25, 2024)
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
0
Attacker Value
Unknown
CVE-2014-3137
Disclosure Date: October 25, 2014 (last updated October 05, 2023)
Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code.
0