First published: Thu Feb 24 2011(Updated: )
An information disclosure flaw was found in the way Python CGI-savvy HTTP Server module processed HTTP GET requests with relative path in the URI (relevant CGI scripts were not executed, but rather their content displayed). A remote attacker could use this flaw to obtain sensitive information. Upstream bug report: [1] <a href="http://bugs.python.org/issue2254">http://bugs.python.org/issue2254</a> Related patch: [2] <a href="http://svn.python.org/view?view=revision&revision=71303">http://svn.python.org/view?view=revision&revision=71303</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | =3.0 | |
debian/python2.4 | ||
debian/python2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2011-1015.
The severity of CVE-2011-1015 is medium.
CVE-2011-1015 affects Python version 2.5, 2.6, and 3.0.
Remote attackers can exploit CVE-2011-1015 by sending an HTTP GET request without a slash character at the beginning of the URI, allowing them to read script source code.
Yes, there are references related to CVE-2011-1015. Please refer to the following links: - [http://openwall.com/lists/oss-security/2011/02/24/10](http://openwall.com/lists/oss-security/2011/02/24/10) - [http://www.securityfocus.com/bid/46541](http://www.securityfocus.com/bid/46541) - [http://hg.python.org/cpython/rev/c6c4398293bd/](http://hg.python.org/cpython/rev/c6c4398293bd/)