USN-4030-1: web2py vulnerabilities

Publication date

21 June 2019

Overview

Several security issues were fixed in web2py.

Releases


Packages

  • web2py - High-level Python web development framework

Details

It was discovered that web2py does not properly check denied hosts before
verifying passwords. An attacker could possibly use this issue to perform
brute-force attacks. (CVE-2016-10321)

It was discovered that web2py allows remote attackers to obtain
environment variable values. An attacker could possibly use this issue to
gain administrative access. (CVE-2016-3952)

It was discovered that web2py uses a hardcoded encryption key. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2016-3953, CVE-2016-3954, CVE-2016-3957)

It was discovered that web2py does not properly check denied hosts before
verifying passwords. An attacker could possibly use this issue to perform
brute-force attacks. (CVE-2016-10321)

It was discovered that web2py allows remote attackers to obtain
environment variable values. An attacker could possibly use this issue to
gain administrative access. (CVE-2016-3952)

It was discovered that web2py uses a hardcoded encryption key. An
attacker could possibly use this issue to execute arbitrary code.
(CVE-2016-3953, CVE-2016-3954, CVE-2016-3957)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
16.04 xenial python-gluon –  2.12.3-1ubuntu0.1
python-web2py –  2.12.3-1ubuntu0.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›