The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://svn.python.org/view?view=revision&revision=71303 | patch |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=680094 | patch exploit |
http://bugs.python.org/issue2254 | patch exploit |
http://openwall.com/lists/oss-security/2011/02/24/10 | mailing list exploit patch |
http://secunia.com/advisories/51040 | third party advisory |
http://secunia.com/advisories/50858 | third party advisory |
http://openwall.com/lists/oss-security/2011/02/23/27 | mailing list exploit patch |
http://securitytracker.com/id?1025489 | vdb entry |
http://www.ubuntu.com/usn/USN-1596-1 | vendor advisory |
http://hg.python.org/cpython/rev/c6c4398293bd/ | patch |
http://www.ubuntu.com/usn/USN-1613-2 | vendor advisory |
http://secunia.com/advisories/51024 | third party advisory |
http://www.ubuntu.com/usn/USN-1613-1 | vendor advisory |
http://www.securityfocus.com/bid/46541 | vdb entry |