[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:096 -- Mandriva python

ID: oval:org.secpod.oval:def:301024Date: (C)2012-01-07   (M)2024-04-17
Class: PATCHFamily: unix




Multiple vulnerabilities have been identified and fixed in python: The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / character at the beginning of the URI . A flaw was found in the Python urllib and urllib2 libraries where they would not differentiate between different target URLs when handling automatic redirects. This caused Python applications using these modules to follow any new URL that they understood, including the file:// URL type. This could allow a remote server to force a local Python application to read a local file instead of the remote one, possibly exposing local files that were not meant to be exposed . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
python
Reference:
MDVSA-2011:096
CVE-2011-1521
CVE-2011-1015
CVE    2
CVE-2011-1015
CVE-2011-1521
CPE    2
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies