7.5
CVSSv2

CVE-2005-0089

Published: 02/05/2005 Updated: 02/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The SimpleXMLRPCServer library module in Python 2.2, 2.3 prior to 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote malicious users to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

Vulnerable Product Search on Vulmon Subscribe to Product

python python 2.4.0

python python

Vendor Advisories

The Python developers discovered a flaw in the SimpleXMLRPCServer module Python XML-RPC servers that used the register_instance() method to register an object, but do not have a dispatch() method, allowed remote users to access or change function internals using the im* and func_* attributes ...
Synopsis python security update Type/Severity Security Advisory: Important Topic Updated Python packages that fix several security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team Description ...
Synopsis python security update Type/Severity Security Advisory: Important Topic Updated Python packages that fix a security issue are now available for RedHat Enterprise Linux 3 Description Python is an interpreted, interactive, object-oriented programming languageAn object traversal bug ...
The Python development team has discovered a flaw in their language package The SimpleXMLRPCServer library module could permit remote attackers unintended access to internals of the registered object or its module or possibly other modules The flaw only affects Python XML-RPC servers that use the register_instance() method to register an object w ...