First published: Mon May 02 2005(Updated: )
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | <2.3.5 | |
Python Python | =2.4.0 | |
Python Software Foundation Python | =2.2 | |
Python Software Foundation Python | =2.3.2 | |
Python Software Foundation Python | =2.3.3 | |
Python Software Foundation Python | =2.4 | |
Python Software Foundation Python | =2.3 | |
Python Software Foundation Python | =2.3.1 | |
Python Software Foundation Python | =2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.