{"vuid":"VU#356409","idnumber":"356409","name":"mod_python vulnerable to information disclosure via crafted URL","keywords":["mod_python","HTTPDAPY","NSAPY","information disclosure"],"overview":"The Apache mod_python module is vulnerable to unintended remote information disclosure using specially crafted URLs.","clean_desc":"From the mod_python web page: Mod_python is an Apache module that embeds the Python interpreter within the server. With mod_python you can write web-based applications in Python that will run many times faster than traditional CGI and will have access to advanced features such as ability to retain database connections and other data between hits and access to Apache internals. The mod_python publisher, which allows Python module objects to be called in a URL, contains a subtle flaw in the request handling logic. Unintended information may be leaked by objects which are not meant to be visible.","impact":"A remote attacker may be able to craft a URL to obtain script data and information which was not meant to be visible. This could include variable names and values, object data, and more.","resolution":"Obtain updated packages\nmod_python has released updated packages which do not contain this flaw: For Apache 1.3: mod_python 2.7.11(or later)\nFor Apache 2.0: mod_python 3.0.4 (or later) These packages can be obtained from the mod_python download page.","workarounds":"A proposed workaround is to set the Apache server to block URLs containing requests that begin with \"func_\". This is not a definitive solution and may also hinder normal operation of the server.","sysaffected":"","thanks":"Thanks to Graham Dumpleton and RedHat for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["https://rhn.redhat.com/errata/RHSA-2005-104.html","https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=146655","http://secunia.com/advisories/14244/","http://secunia.com/advisories/14235/","http://security.gentoo.org/glsa/glsa-200502-14.xml","http://www.trustix.org/errata/2005/0003/"],"cveids":["CVE-2005-0088"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-11T14:52:26Z","publicdate":"2005-02-11T00:00:00Z","datefirstpublished":"2005-02-21T21:37:38Z","dateupdated":"2005-07-06T18:12:58Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"7","cam_impact":"4","cam_easeofexploitation":"8","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.26","cam_scorecurrentwidelyknown":"1.575","cam_scorecurrentwidelyknownexploited":"2.835","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.26,"vulnote":null}