CVE-2011-1015

The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:25

Type Values Removed Values Added
References () http://bugs.python.org/issue2254 - Exploit, Patch () http://bugs.python.org/issue2254 - Exploit, Patch
References () http://hg.python.org/cpython/rev/c6c4398293bd/ - Patch () http://hg.python.org/cpython/rev/c6c4398293bd/ - Patch
References () http://openwall.com/lists/oss-security/2011/02/23/27 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/02/23/27 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2011/02/24/10 - Exploit, Patch () http://openwall.com/lists/oss-security/2011/02/24/10 - Exploit, Patch
References () http://secunia.com/advisories/50858 - () http://secunia.com/advisories/50858 -
References () http://secunia.com/advisories/51024 - () http://secunia.com/advisories/51024 -
References () http://secunia.com/advisories/51040 - () http://secunia.com/advisories/51040 -
References () http://securitytracker.com/id?1025489 - () http://securitytracker.com/id?1025489 -
References () http://svn.python.org/view?view=revision&revision=71303 - Patch () http://svn.python.org/view?view=revision&revision=71303 - Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 -
References () http://www.securityfocus.com/bid/46541 - () http://www.securityfocus.com/bid/46541 -
References () http://www.ubuntu.com/usn/USN-1596-1 - () http://www.ubuntu.com/usn/USN-1596-1 -
References () http://www.ubuntu.com/usn/USN-1613-1 - () http://www.ubuntu.com/usn/USN-1613-1 -
References () http://www.ubuntu.com/usn/USN-1613-2 - () http://www.ubuntu.com/usn/USN-1613-2 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=680094 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=680094 - Exploit, Patch

Information

Published : 2011-05-09 22:55

Updated : 2024-11-21 01:25


NVD link : CVE-2011-1015

Mitre link : CVE-2011-1015

CVE.ORG link : CVE-2011-1015


JSON object : View

Products Affected

python

  • python
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor