CVE-2011-1015
(CGIHTTPServer): CGI script source code disclosure
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
El método is_cgi en CGIHTTPServer.py del módulo CGIHTTPServer en Python v2.5,v2.6 y v3.0 permite a atacantes remotos leer el código fuente de los scripts a través de una solicitud HTTP GET que carece de una / ( barra) de caracteres al principio de la URI.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-02-14 CVE Reserved
- 2011-05-09 CVE Published
- 2023-05-28 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/50858 | Third Party Advisory | |
http://secunia.com/advisories/51024 | Third Party Advisory | |
http://secunia.com/advisories/51040 | Third Party Advisory | |
http://securitytracker.com/id?1025489 | Vdb Entry | |
http://www.securityfocus.com/bid/46541 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://bugs.python.org/issue2254 | 2024-08-06 | |
http://openwall.com/lists/oss-security/2011/02/23/27 | 2024-08-06 | |
http://openwall.com/lists/oss-security/2011/02/24/10 | 2024-08-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=680094 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://hg.python.org/cpython/rev/c6c4398293bd | 2019-10-25 | |
http://svn.python.org/view?view=revision&revision=71303 | 2019-10-25 |
URL | Date | SRC |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:096 | 2019-10-25 | |
http://www.ubuntu.com/usn/USN-1596-1 | 2019-10-25 | |
http://www.ubuntu.com/usn/USN-1613-1 | 2019-10-25 | |
http://www.ubuntu.com/usn/USN-1613-2 | 2019-10-25 | |
https://access.redhat.com/security/cve/CVE-2011-1015 | 2011-05-19 |