Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 does not properly limit content types, which allows remote attackers to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that would not be accepted, as demonstrated in YouCompleteMe to execute arbitrary code.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/defnull/bottle/issues/616 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1093255 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2014/05/01/15 | mailing list |
http://www.debian.org/security/2014/dsa-2948 | vendor advisory |