what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

PSF-2005-001.txt

PSF-2005-001.txt
Posted Feb 5, 2005
Site python.org

Python Security Advisory PSF-2005-001 - The Python development team has discovered a flaw in the SimpleXMLRPCServer library module which can give remote attackers access to internals of the registered object or its module or possibly other modules. Versions affected: 2.2 all versions, 2.3 prior to 2.3.5, 2.4.

tags | advisory, remote, python
advisories | CVE-2005-0089
SHA-256 | 43bd027db911c38f6953ba201bce2e992e97d449243f8722839573151a9cb9ee

PSF-2005-001.txt

Change Mirror Download
http://www.python.org/security/PSF-2005-001/

---------------------------------------------------------------------
Python Security Advisory

Advisory ID: PSF-2005-001
Issue Date: February 3, 2005
Product: Python
Versions: 2.2 all versions, 2.3 prior to 2.3.5, 2.4
CVE Names: CAN-2005-0089
---------------------------------------------------------------------

Python is an interpreted, interactive, object-oriented programming
language. It is often compared to Tcl, Perl, Scheme or Java.

The Python development team has discovered a flaw in the
SimpleXMLRPCServer library module which can give remote attackers
access to internals of the registered object or its module or possibly
other modules. The flaw only affects Python XML-RPC servers that use
the register_instance() method to register an object without a
_dispatch() method. Servers using only register_function() are not
affected.

On vulnerable XML-RPC servers, a remote attacker may be able to view
or modify globals of the module(s) containing the registered
instance's class(es), potentially leading to data loss or arbitrary
code execution. If the registered object is a module, the danger is
particularly serious. For example, if the registered module imports
the os module, an attacker could invoke the os.system() function.

But the attack is not limited to registered object modules; for
example, the code in the Python cookbook recipe at
http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/165375 is
vulnerable to an attack using im_func.func_globals.update which allows
reading or modifying the global variable accessList.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0089 to this issue.

Python 2.3.5 will be released from www.python.org within a few days
containing a fix for this issue. Python 2.4.1 will be released later
this month containing the same fix. Patches for Python 2.2, 2.3 and
2.4 are also immediately available:

- http://python.org/security/PSF-2005-001/patch-2.2.txt (Python 2.2)

- http://python.org/security/PSF-2005-001/patch.txt (Python 2.3, 2.4)

Note that these patches disable recursive traversal, potentially
resulting in reduced functionality of XML-RPC applications depending
on this feature.

--
--Guido van Rossum (home page: http://www.python.org/~guido/)
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close