Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2023-45158

Disclosure Date: October 16, 2023 (last updated February 25, 2025)
An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product.
Attacker Value
Unknown

CVE-2023-22432

Disclosure Date: March 06, 2023 (last updated February 24, 2025)
Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.
Attacker Value
Unknown

CVE-2022-33146

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
Attacker Value
Unknown

CVE-2016-3952

Disclosure Date: February 06, 2018 (last updated November 26, 2024)
web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access.
0
Attacker Value
Unknown

CVE-2016-3953

Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the session.connect function.
0
Attacker Value
Unknown

CVE-2016-3954

Disclosure Date: February 06, 2018 (last updated November 26, 2024)
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
0
Attacker Value
Unknown

CVE-2016-3957

Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
0
Attacker Value
Unknown

CVE-2015-6961

Disclosure Date: October 18, 2017 (last updated November 26, 2024)
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
0
Attacker Value
Unknown

CVE-2016-10321

Disclosure Date: April 10, 2017 (last updated November 26, 2024)
web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks.
0
Attacker Value
Unknown

CVE-2016-4806

Disclosure Date: January 11, 2017 (last updated November 25, 2024)
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
0