First published: Mon May 02 2005(Updated: )
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | =2.2 | |
CPython | =2.3.2 | |
CPython | =2.3.3 | |
CPython | =2.4 | |
CPython | =2.3 | |
CPython | =2.3.1 | |
CPython | =2.3.4 | |
Python Babel Localedata | <2.3.5 | |
Python Babel Localedata | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0089 has a moderate severity rating due to its potential for unauthorized access and modification of globals.
To fix CVE-2005-0089, update your Python version to 2.3.5 or later to eliminate the vulnerability.
With CVE-2005-0089, remote attackers may exploit the vulnerability to read or modify global variables and potentially execute arbitrary code.
CVE-2005-0089 affects Python versions 2.2, 2.3 up to 2.3.4, and 2.4.
Yes, a patch for CVE-2005-0089 is included in updates for affected versions of Python.