CVE-2011-1521

Current Description

The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.

Referenced by CVEs:CVE-2011-4137

Basic Data

PublishedMay 24, 2011
Last ModifiedOctober 25, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-399
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.4
SeverityMEDIUM
Exploitability Score10.0
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPythonPython2.0*******
    2.3ApplicationPythonPython2.0.1*******
    2.3ApplicationPythonPython2.1*******
    2.3ApplicationPythonPython2.1.1*******
    2.3ApplicationPythonPython2.1.2*******
    2.3ApplicationPythonPython2.1.3*******
    2.3ApplicationPythonPython2.2*******
    2.3ApplicationPythonPython2.2.1*******
    2.3ApplicationPythonPython2.2.2*******
    2.3ApplicationPythonPython2.2.3*******
    2.3ApplicationPythonPython2.3.1*******
    2.3ApplicationPythonPython2.3.2*******
    2.3ApplicationPythonPython2.3.3*******
    2.3ApplicationPythonPython2.3.4*******
    2.3ApplicationPythonPython2.3.5*******
    2.3ApplicationPythonPython2.3.7*******
    2.3ApplicationPythonPython2.4.1*******
    2.3ApplicationPythonPython2.4.2*******
    2.3ApplicationPythonPython2.4.3*******
    2.3ApplicationPythonPython2.4.4*******
    2.3ApplicationPythonPython2.4.6*******
    2.3ApplicationPythonPython2.5.1*******
    2.3ApplicationPythonPython2.5.2*******
    2.3ApplicationPythonPython2.5.3*******
    2.3ApplicationPythonPython2.5.4*******
    2.3ApplicationPythonPython2.6.1*******
    2.3ApplicationPythonPython2.6.4*******
    2.3ApplicationPythonPython2.6.5*******
    2.3ApplicationPythonPython2.6.6*******
    2.3ApplicationPythonPython2.6.7*******
    2.3ApplicationPythonPython2.7.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationPythonPython3.0*******
    2.3ApplicationPythonPython3.0.1*******
    2.3ApplicationPythonPython3.1*******
    2.3ApplicationPythonPython3.1.1*******
    2.3ApplicationPythonPython3.1.2*******
    2.3ApplicationPythonPython3.1.3*******
    2.3ApplicationPythonPython3.2*******
    2.3ApplicationPythonPython3.2alpha******

Vulnerable Software List

VendorProductVersions
Python Python 2.0, 2.0.1, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.7, 2.4.1, 2.4.2, 2.4.3, 2.4.4, 2.4.6, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.6.1, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.7.1, 3.0, 3.0.1, 3.1, 3.1.1, 3.1.2, 3.1.3, 3.2

References

NameSourceURLTags
http://bugs.python.org/issue11662http://bugs.python.org/issue11662CONFIRMPatch
http://hg.python.org/cpython/file/96a6c128822b/Misc/NEWShttp://hg.python.org/cpython/file/96a6c128822b/Misc/NEWSCONFIRM
http://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWShttp://hg.python.org/cpython/file/b2934d98dac1/Misc/NEWSCONFIRM
http://hg.python.org/cpython/rev/96a6c128822b/http://hg.python.org/cpython/rev/96a6c128822b/CONFIRMPatch
http://hg.python.org/cpython/rev/b2934d98dac1/http://hg.python.org/cpython/rev/b2934d98dac1/CONFIRMPatch
APPLE-SA-2011-10-12-3http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlAPPLE
SUSE-SR:2011:009http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.htmlSUSE
[oss-security] 20110324 CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemeshttp://openwall.com/lists/oss-security/2011/03/24/5MLIST
[oss-security] 20110328 Re: CVE Request -- Python (urllib, urllib2): Improper management of ftp:// and file:// URL schemeshttp://openwall.com/lists/oss-security/2011/03/28/2MLIST
[oss-security] 20110911 CVE Request -- Django: v1.3.1, v1.2.7 multiple security flawshttp://openwall.com/lists/oss-security/2011/09/11/1MLIST
[oss-security] 20110913 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flawshttp://openwall.com/lists/oss-security/2011/09/13/2MLIST
[oss-security] 20110916 Re: CVE Request -- Django: v1.3.1, v1.2.7 multiple security flawshttp://openwall.com/lists/oss-security/2011/09/15/5MLIST
50858http://secunia.com/advisories/50858SECUNIA
51024http://secunia.com/advisories/51024SECUNIA
51040http://secunia.com/advisories/51040SECUNIA
1025488http://securitytracker.com/id?1025488SECTRACK
http://support.apple.com/kb/HT5002http://support.apple.com/kb/HT5002CONFIRM
MDVSA-2011:096http://www.mandriva.com/security/advisories?name=MDVSA-2011:096MANDRIVA
USN-1592-1http://www.ubuntu.com/usn/USN-1592-1UBUNTU
USN-1596-1http://www.ubuntu.com/usn/USN-1596-1UBUNTU
USN-1613-1http://www.ubuntu.com/usn/USN-1613-1UBUNTU
USN-1613-2http://www.ubuntu.com/usn/USN-1613-2UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=690560https://bugzilla.redhat.com/show_bug.cgi?id=690560CONFIRMPatch
https://bugzilla.redhat.com/show_bug.cgi?id=737366https://bugzilla.redhat.com/show_bug.cgi?id=737366CONFIRM
https://www.djangoproject.com/weblog/2011/sep/09/https://www.djangoproject.com/weblog/2011/sep/09/CONFIRM
https://www.djangoproject.com/weblog/2011/sep/10/127/https://www.djangoproject.com/weblog/2011/sep/10/127/CONFIRM