Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown
CVE-2023-45158
Disclosure Date: October 16, 2023 (last updated February 25, 2025)
An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product.
0
Attacker Value
Unknown
CVE-2023-22432
Disclosure Date: March 06, 2023 (last updated February 24, 2025)
Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.
0
Attacker Value
Unknown
CVE-2022-33146
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
0
Attacker Value
Unknown
CVE-2016-3952
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access.
0
Attacker Value
Unknown
CVE-2016-3953
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the session.connect function.
0
Attacker Value
Unknown
CVE-2016-3954
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
0
Attacker Value
Unknown
CVE-2016-3957
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
0
Attacker Value
Unknown
CVE-2015-6961
Disclosure Date: October 18, 2017 (last updated November 26, 2024)
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
0
Attacker Value
Unknown
CVE-2016-10321
Disclosure Date: April 10, 2017 (last updated November 26, 2024)
web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks.
0
Attacker Value
Unknown
CVE-2016-4806
Disclosure Date: January 11, 2017 (last updated November 25, 2024)
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
0