Executive Summary

Informations
Name CVE-2011-1015 First vendor Publication 2011-05-09
Vendor Cve Last vendor Modification 2019-10-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20416
 
Oval ID: oval:org.mitre.oval:def:20416
Title: VMware ESXi and ESX updates to third party library and ESX Service Console
Description: The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
Family: unix Class: vulnerability
Reference(s): CVE-2011-1015
Version: 4
Platform(s): VMWare ESX Server 4.1
VMWare ESX Server 4.0
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2012-10-19 Name : Ubuntu Update for python2.5 USN-1613-1
File : nvt/gb_ubuntu_USN_1613_1.nasl
2012-10-19 Name : Ubuntu Update for python2.4 USN-1613-2
File : nvt/gb_ubuntu_USN_1613_2.nasl
2012-10-05 Name : Ubuntu Update for python2.6 USN-1596-1
File : nvt/gb_ubuntu_USN_1596_1.nasl
2012-07-30 Name : CentOS Update for python CESA-2011:0491 centos4 x86_64
File : nvt/gb_CESA-2011_0491_python_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for python CESA-2011:0492 centos5 x86_64
File : nvt/gb_CESA-2011_0492_python_centos5_x86_64.nasl
2012-06-06 Name : RedHat Update for python RHSA-2011:0554-01
File : nvt/gb_RHSA-2011_0554-01_python.nasl
2012-03-15 Name : VMSA-2012-0001 VMware ESXi and ESX updates to third party library and ESX Ser...
File : nvt/gb_VMSA-2012-0001.nasl
2011-08-09 Name : CentOS Update for python CESA-2011:0491 centos4 i386
File : nvt/gb_CESA-2011_0491_python_centos4_i386.nasl
2011-08-09 Name : CentOS Update for python CESA-2011:0492 centos5 i386
File : nvt/gb_CESA-2011_0492_python_centos5_i386.nasl
2011-06-07 Name : Python CGIHTTPServer Module Information Disclosure Vulnerability
File : nvt/gb_python_cgi_info_disc_vuln_win.nasl
2011-05-23 Name : Mandriva Update for python MDVSA-2011:096 (python)
File : nvt/gb_mandriva_MDVSA_2011_096.nasl
2011-05-06 Name : RedHat Update for python RHSA-2011:0491-01
File : nvt/gb_RHSA-2011_0491-01_python.nasl
2011-05-06 Name : RedHat Update for python RHSA-2011:0492-01
File : nvt/gb_RHSA-2011_0492-01_python.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71361 Python CGIHTTPServer Module cgi-bin Code Disclosure

Python contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when the 'CGIHTTPServer' module does not handle HTTP requests to scripts in the 'cgi-bin' directory correctly, which will disclose CGI script source code to a remote attacker via crafted requests to the server.

Information Assurance Vulnerability Management (IAVM)

Date Description
2012-02-02 IAVM : 2012-A-0020 - Multiple Vulnerabilities in VMware ESX 4.1 and ESXi 4.1
Severity : Category I - VMSKEY : V0031252

Nessus® Vulnerability Scanner

Date Description
2016-03-03 Name : The remote VMware ESXi / ESX host is missing a security-related patch.
File : vmware_VMSA-2012-0001_remote.nasl - Type : ACT_GATHER_INFO
2014-01-07 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201401-04.nasl - Type : ACT_GATHER_INFO
2013-11-13 Name : The remote VMware ESXi 5.0 host is affected by multiple vulnerabilities.
File : vmware_esxi_5_0_build_608089_remote.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0491.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0492.nasl - Type : ACT_GATHER_INFO
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_python-randomisation-update-120517.nasl - Type : ACT_GATHER_INFO
2013-01-25 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_python-randomisation-update-120516.nasl - Type : ACT_GATHER_INFO
2012-10-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1613-2.nasl - Type : ACT_GATHER_INFO
2012-10-18 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1613-1.nasl - Type : ACT_GATHER_INFO
2012-10-05 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1596-1.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110519_python_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110505_python_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-04-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_python-8080.nasl - Type : ACT_GATHER_INFO
2012-01-31 Name : The remote VMware ESXi / ESX host is missing one or more security-related pat...
File : vmware_VMSA-2012-0001.nasl - Type : ACT_GATHER_INFO
2011-05-23 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-096.nasl - Type : ACT_GATHER_INFO
2011-05-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0554.nasl - Type : ACT_GATHER_INFO
2011-05-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-0491.nasl - Type : ACT_GATHER_INFO
2011-05-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0492.nasl - Type : ACT_GATHER_INFO
2011-05-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0491.nasl - Type : ACT_GATHER_INFO
2011-05-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-0492.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/46541
CONFIRM http://bugs.python.org/issue2254
http://hg.python.org/cpython/rev/c6c4398293bd/
http://svn.python.org/view?view=revision&revision=71303
https://bugzilla.redhat.com/show_bug.cgi?id=680094
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2011:096
MLIST http://openwall.com/lists/oss-security/2011/02/23/27
http://openwall.com/lists/oss-security/2011/02/24/10
SECTRACK http://securitytracker.com/id?1025489
SECUNIA http://secunia.com/advisories/50858
http://secunia.com/advisories/51024
http://secunia.com/advisories/51040
UBUNTU http://www.ubuntu.com/usn/USN-1596-1
http://www.ubuntu.com/usn/USN-1613-1
http://www.ubuntu.com/usn/USN-1613-2

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-02-02 01:15:35
  • Multiple Updates
2024-02-01 12:04:21
  • Multiple Updates
2023-09-05 12:14:34
  • Multiple Updates
2023-09-05 01:04:13
  • Multiple Updates
2023-09-02 12:14:37
  • Multiple Updates
2023-09-02 01:04:16
  • Multiple Updates
2023-08-12 12:17:37
  • Multiple Updates
2023-08-12 01:04:17
  • Multiple Updates
2023-08-11 12:14:42
  • Multiple Updates
2023-08-11 01:04:25
  • Multiple Updates
2023-08-06 12:14:08
  • Multiple Updates
2023-08-06 01:04:18
  • Multiple Updates
2023-08-04 12:14:13
  • Multiple Updates
2023-08-04 01:04:19
  • Multiple Updates
2023-07-14 12:14:11
  • Multiple Updates
2023-07-14 01:04:16
  • Multiple Updates
2023-03-29 01:16:06
  • Multiple Updates
2023-03-28 12:04:22
  • Multiple Updates
2022-10-11 12:12:39
  • Multiple Updates
2022-10-11 01:04:03
  • Multiple Updates
2021-05-04 12:14:07
  • Multiple Updates
2021-04-22 01:15:19
  • Multiple Updates
2020-05-23 00:27:56
  • Multiple Updates
2016-04-26 20:35:57
  • Multiple Updates
2016-03-04 13:26:25
  • Multiple Updates
2014-02-17 11:00:53
  • Multiple Updates
2013-11-11 12:39:15
  • Multiple Updates
2013-05-16 17:02:45
  • Multiple Updates
2013-05-10 22:55:58
  • Multiple Updates
2013-01-30 13:20:57
  • Multiple Updates