FreeBSD : python -- SimpleXMLRPCServer.py allows unrestricted traversal (6afa87d3-764b-11d9-b0e7-0000e249a0a2)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

According to Python Security Advisory PSF-2005-001,

The Python development team has discovered a flaw in the
SimpleXMLRPCServer library module which can give remote attackers
access to internals of the registered object or its module or possibly
other modules. The flaw only affects Python XML-RPC servers that use
the register_instance() method to register an object without a
_dispatch() method. Servers using only register_function() are not
affected.

On vulnerable XML-RPC servers, a remote attacker may be able to view
or modify globals of the module(s) containing the registered
instance's class(es), potentially leading to data loss or arbitrary
code execution. If the registered object is a module, the danger is
particularly serious. For example, if the registered module imports
the os module, an attacker could invoke the os.system() function.

Note: This vulnerability affects your system only if you're running
SimpleXMLRPCServer-based server. This isn't harmful at all if you
don't run any internet server written in Python or your server doesn't
serve in XML-RPC protocol.

See also :

http://www.python.org/security/PSF-2005-001/
http://www.nessus.org/u?07577ee5

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18972 (freebsd_pkg_6afa87d3764b11d9b0e70000e249a0a2.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0089

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now