An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product.
Max CVSS
9.8
EPSS Score
0.08%
Published
2023-10-16
Updated
2023-10-18
Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.
Max CVSS
6.1
EPSS Score
0.95%
Published
2023-03-06
Updated
2023-03-13
Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
Max CVSS
6.1
EPSS Score
0.15%
Published
2022-06-27
Updated
2022-07-07
web2py before 2.14.6 does not properly check if a host is denied before verifying passwords, allowing a remote attacker to perform brute-force attacks.
Max CVSS
9.8
EPSS Score
0.83%
Published
2017-04-10
Updated
2019-06-21

CVE-2016-4808

Public exploit
Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged in user to perform some unwanted actions i.e An attacker can trick an victim to disable the installed application just by sending a URL to victim.
Max CVSS
8.8
EPSS Score
0.44%
Published
2017-01-11
Updated
2017-01-19

CVE-2016-4807

Public exploit
Web2py versions 2.14.5 and below was affected by Reflected XSS vulnerability, which allows an attacker to perform an XSS attack on logged in user (admin).
Max CVSS
4.8
EPSS Score
0.08%
Published
2017-01-11
Updated
2017-01-11

CVE-2016-4806

Public exploit
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
Max CVSS
7.5
EPSS Score
0.63%
Published
2017-01-11
Updated
2017-01-19
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
Max CVSS
9.8
EPSS Score
2.07%
Published
2018-02-06
Updated
2019-06-21
web2py before 2.14.2 allows remote attackers to obtain the session_cookie_key value via a direct request to examples/simple_examples/status. NOTE: this issue can be leveraged by remote attackers to execute arbitrary code using CVE-2016-3957.
Max CVSS
5.5
EPSS Score
0.34%
Published
2018-02-06
Updated
2019-06-21
The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the session.connect function.
Max CVSS
9.8
EPSS Score
2.06%
Published
2018-02-06
Updated
2019-06-21
web2py before 2.14.1, when using the standalone version, allows remote attackers to obtain environment variable values via a direct request to examples/template_examples/beautify. NOTE: this issue can be leveraged by remote attackers to gain administrative access.
Max CVSS
7.8
EPSS Score
0.34%
Published
2018-02-06
Updated
2019-06-21
Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the _next parameter to user/logout.
Max CVSS
6.1
EPSS Score
0.11%
Published
2017-10-18
Updated
2017-10-31
Cross-site scripting (XSS) vulnerability in static/js/share.js (aka the social bookmarking widget) in Web2py before 2.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Max CVSS
4.3
EPSS Score
0.14%
Published
2013-05-22
Updated
2013-07-15
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!