USN-4030-1: web2py vulnerabilities
Publication date
21 June 2019
Overview
Several security issues were fixed in web2py.
Releases
Packages
- web2py - High-level Python web development framework
Details
It was discovered that web2py does not properly check denied hosts before
verifying passwords. An attacker could possibly use this issue to perform
brute-force attacks. (CVE-2016-10321)
It was discovered that web2py allows remote attackers to obtain
environment variable values. An attacker could possibly use this issue to
gain administrative access. (CVE-2016-3952)
It was discovered that web2py uses a hardcoded encryption key. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2016-3953, CVE-2016-3954, CVE-2016-3957)
It was discovered that web2py does not properly check denied hosts before
verifying passwords. An attacker could possibly use this issue to perform
brute-force attacks. (CVE-2016-10321)
It was discovered that web2py allows remote attackers to obtain
environment variable values. An attacker could possibly use this issue to
gain administrative access. (CVE-2016-3952)
It was discovered that web2py uses a hardcoded encryption key. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2016-3953, CVE-2016-3954, CVE-2016-3957)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | python-gluon – 2.12.3-1ubuntu0.1 | ||
python-web2py – 2.12.3-1ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.