ID CVE-2005-0088
Summary The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
References
Vulnerable Configurations
  • Apache Software Foundation mod_python 1.9a
    cpe:2.3:a:apache:mod_python:1.9a
  • Apache Software Foundation mod_python 2.0
    cpe:2.3:a:apache:mod_python:2.0
  • Apache Software Foundation mod_python 2.1
    cpe:2.3:a:apache:mod_python:2.1
  • Apache Software Foundation mod_python 2.2
    cpe:2.3:a:apache:mod_python:2.2
  • Apache Software Foundation mod_python 2.3
    cpe:2.3:a:apache:mod_python:2.3
  • Apache Software Foundation mod_python 2.4
    cpe:2.3:a:apache:mod_python:2.4
  • Apache Software Foundation mod_python 2.4.1
    cpe:2.3:a:apache:mod_python:2.4.1
  • Apache Software Foundation mod_python 2.5
    cpe:2.3:a:apache:mod_python:2.5
  • Apache Software Foundation mod_python 2.6
    cpe:2.3:a:apache:mod_python:2.6
  • Apache Software Foundation mod_python 2.6.1
    cpe:2.3:a:apache:mod_python:2.6.1
  • Apache Software Foundation mod_python 2.6.2
    cpe:2.3:a:apache:mod_python:2.6.2
  • Apache Software Foundation mod_python 2.6.3
    cpe:2.3:a:apache:mod_python:2.6.3
  • Apache Software Foundation mod_python 2.6.4
    cpe:2.3:a:apache:mod_python:2.6.4
  • Apache Software Foundation mod_python 2.7
    cpe:2.3:a:apache:mod_python:2.7
  • Apache Software Foundation mod_python 2.7.1
    cpe:2.3:a:apache:mod_python:2.7.1
  • Apache Software Foundation mod_python 2.7.2
    cpe:2.3:a:apache:mod_python:2.7.2
  • Apache Software Foundation mod_python 2.7.3
    cpe:2.3:a:apache:mod_python:2.7.3
  • Apache Software Foundation mod_python 2.7.4
    cpe:2.3:a:apache:mod_python:2.7.4
  • Apache Software Foundation mod_python 2.7.5
    cpe:2.3:a:apache:mod_python:2.7.5
  • Apache Software Foundation mod_python 2.7.6
    cpe:2.3:a:apache:mod_python:2.7.6
  • Apache Software Foundation mod_python 2.7.7
    cpe:2.3:a:apache:mod_python:2.7.7
  • Apache Software Foundation mod_python 2.7.8
    cpe:2.3:a:apache:mod_python:2.7.8
CVSS
Base: 7.5 (as of 02-06-2005 - 22:46)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-689.NASL
    description Graham Dumpleton discovered a flaw which can affect anyone using the publisher handle of the Apache Software Foundation's mod_python. The publisher handle lets you publish objects inside modules to make them callable via URL. The flaw allows a carefully crafted URL to obtain extra information that should not be visible (information leak).
    last seen 2019-02-21
    modified 2018-08-09
    plugin id 17197
    published 2005-02-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17197
    title Debian DSA-689-1 : libapache-mod-python - missing input sanitizing
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_5192E7CA7D4F11D9A9E70001020EED82.NASL
    description Mark J Cox reports : Graham Dumpleton discovered a flaw which can affect anyone using the publisher handle of the Apache Software Foundation mod_python. The publisher handle lets you publish objects inside modules to make them callable via URL. The flaw allows a carefully crafted URL to obtain extra information that should not be visible (information leak).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 18932
    published 2005-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18932
    title FreeBSD : mod_python -- information leakage vulnerability (5192e7ca-7d4f-11d9-a9e7-0001020eed82)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200502-14.NASL
    description The remote host is affected by the vulnerability described in GLSA-200502-14 (mod_python: Publisher Handler vulnerability) Graham Dumpleton discovered a vulnerability in mod_python's Publisher Handler. Impact : By requesting a specially crafted URL for a published module page, an attacker could obtain information about restricted variables. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 16451
    published 2005-02-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=16451
    title GLSA-200502-14 : mod_python: Publisher Handler vulnerability
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-80-1.NASL
    description Graham Dumpleton discovered an information disclosure in the 'publisher' handle of mod_python. By requesting a carefully crafted URL for a published module page, anybody can obtain extra information about internal variables, objects, and other information which is not intended to be visible. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 20704
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20704
    title Ubuntu 4.10 : libapache2-mod-python vulnerabilities (USN-80-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2005-139.NASL
    description Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0088 to this issue. This update includes a patch which fixes this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 16373
    published 2005-02-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=16373
    title Fedora Core 2 : mod_python-3.1.3-1.fc2.2 (2005-139)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2005-140.NASL
    description Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0088 to this issue. This update includes a patch which fixes this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 16374
    published 2005-02-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=16374
    title Fedora Core 3 : mod_python-3.1.3-5.2 (2005-140)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-104.NASL
    description An Updated mod_python package that fixes a security issue in the publisher handler is now available. Mod_python is a module that embeds the Python language interpreter within the Apache web server, allowing handlers to be written in Python. Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0088 to this issue. Users of mod_python are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 16367
    published 2005-02-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=16367
    title RHEL 2.1 / 3 : mod_python (RHSA-2005:104)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_9905.NASL
    description This update fixes an infomation leak in mod_python when using the publisher handle. Due to the bug it is possible to get access to published objects remotely without permission. (CVE-2005-0088)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 41349
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41349
    title SuSE9 Security Update : mod_python (YOU Patch Number 9905)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-100.NASL
    description An updated mod_python package that fixes a security issue in the publisher handle is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Mod_python is a module that embeds the Python language interpreter within the Apache web server, allowing handlers to be written in Python. Graham Dumpleton discovered a flaw affecting the publisher handler of mod_python, used to make objects inside modules callable via URL. A remote user could visit a carefully crafted URL that would gain access to objects that should not be visible, leading to an information leak. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0088 to this issue. Users of mod_python are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 17186
    published 2005-02-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=17186
    title RHEL 4 : mod_python (RHSA-2005:100)
oval via4
accepted 2013-04-29T04:07:08.180-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
family unix
id oval:org.mitre.oval:def:10617
status accepted
submitted 2010-07-09T03:56:16-04:00
title SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
version 23
redhat via4
advisories
  • rhsa
    id RHSA-2005:100
  • rhsa
    id RHSA-2005:104
refmap via4
bid 12519
bugtraq 20050211 [USN-80-1] mod_python vulnerability
cert-vn VU#356409
conectiva CLA-2005:926
debian DSA-689
fedora FLSA:152896
gentoo GLSA-200502-14
sectrack 1013156
trustix 2005-0003
Last major update 17-10-2016 - 23:07
Published 02-05-2005 - 00:00
Last modified 19-10-2018 - 11:31
Back to Top