The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://svn.python.org/view?view=revision&revision=71303 | x_refsource_CONFIRM x_transferred |
| http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| https://bugzilla.redhat.com/show_bug.cgi?id=680094 | x_refsource_CONFIRM x_transferred |
| http://bugs.python.org/issue2254 | x_refsource_CONFIRM x_transferred |
| http://openwall.com/lists/oss-security/2011/02/24/10 | mailing-list x_refsource_MLIST x_transferred |
| http://secunia.com/advisories/51040 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/50858 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://openwall.com/lists/oss-security/2011/02/23/27 | mailing-list x_refsource_MLIST x_transferred |
| http://securitytracker.com/id?1025489 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://www.ubuntu.com/usn/USN-1596-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://hg.python.org/cpython/rev/c6c4398293bd/ | x_refsource_CONFIRM x_transferred |
| http://www.ubuntu.com/usn/USN-1613-2 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://secunia.com/advisories/51024 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.ubuntu.com/usn/USN-1613-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.securityfocus.com/bid/46541 | vdb-entry x_refsource_BID x_transferred |