CERTA-2005-AVI-072
Vulnerability from certfr_avis

Une vulnérabilité du module Apache mod_python permet à un utilisateur distant d'accéder à des informations confidentielles.

Description

Le module Apache mod_python est un interpréteur du langage Python pour les serveurs HTTP Apache.

Une vulnérabilité a été découverte dans le module mod_python. Elle permet à un utilisateur distant mal intentionné de récupérer, par le biais d'une URL malicieusement construite, des informations qui ne devraient pas être visibles.

Solution

Les versions 3.1.4 et 2.7.11 corrigent cette vulnérabilité. Appliquer le correctif proposé par l'éditeur (cf. section Documentation).

None
Impacted products
Vendor Product Description
Apache N/A module mod_python versions 2.7.10 et antérieures.
Apache N/A Module mod_python versions 3.1.3 et antérieures ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "module mod_python versions 2.7.10 et ant\u00e9rieures.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    },
    {
      "description": "Module mod_python versions 3.1.3 et ant\u00e9rieures ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apache",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLe module Apache mod_python est un interpr\u00e9teur du langage Python pour\nles serveurs HTTP Apache.  \n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le module mod_python. Elle\npermet \u00e0 un utilisateur distant mal intentionn\u00e9 de r\u00e9cup\u00e9rer, par le\nbiais d\u0027une URL malicieusement construite, des informations qui ne\ndevraient pas \u00eatre visibles.\n\n## Solution\n\nLes versions 3.1.4 et 2.7.11 corrigent cette vuln\u00e9rabilit\u00e9. Appliquer le\ncorrectif propos\u00e9 par l\u0027\u00e9diteur (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-02-14T00:00:00",
  "last_revision_date": "2005-03-01T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200502-14 du 13 f\u00e9vrier    2005 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-14.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-689 du 23 f\u00e9vrier 2005 :",
      "url": "http://www.debian.org/security/2005/dsa-689"
    },
    {
      "title": "Site Internet du module mod_python :",
      "url": "http://www.modpython.org"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD ap-python :",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/www/ap-python/README.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD sur mod_pyton du 13 f\u00e9vrier    2003 :",
      "url": "http://www.vuxml.org/freebsd/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:104-03 du 10 f\u00e9vrier    2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-104.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:100-04 du 15 f\u00e9vrier    2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-100.html"
    },
    {
      "title": "R\u00e9f\u00e9rence CVE CAN-2005-088 :",
      "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0088"
    }
  ],
  "reference": "CERTA-2005-AVI-072",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-02-14T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat.",
      "revision_date": "2005-02-17T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
      "revision_date": "2005-02-24T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 NetBSD.",
      "revision_date": "2005-03-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 du module Apache \u003cspan\nclass=\"textit\"\u003emod_python\u003c/span\u003e permet \u00e0 un utilisateur distant\nd\u0027acc\u00e9der \u00e0 des informations confidentielles.\n",
  "title": "Vuln\u00e9rabilit\u00e9 du module Apache mod_python",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200502-14 du 13 f\u00e9vrier 2005",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…