Lucene search

K
amazonAmazonALAS-2020-1342
HistoryFeb 10, 2020 - 11:33 p.m.

Medium: python27, python35, python36

2020-02-1023:33:00
alas.aws.amazon.com
99

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

59.2%

Issue Overview:

The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server. (CVE-2019-16935)

Affected Packages:

python27, python35, python36

Issue Correction:
Run yum update python27 to update your system.
Run yum update python35 to update your system.
Run yum update python36 to update your system.

New Packages:

i686:  
    python27-tools-2.7.16-1.131.amzn1.i686  
    python27-devel-2.7.16-1.131.amzn1.i686  
    python27-test-2.7.16-1.131.amzn1.i686  
    python27-libs-2.7.16-1.131.amzn1.i686  
    python27-debuginfo-2.7.16-1.131.amzn1.i686  
    python27-2.7.16-1.131.amzn1.i686  
    python35-debuginfo-3.5.7-1.25.amzn1.i686  
    python35-tools-3.5.7-1.25.amzn1.i686  
    python35-libs-3.5.7-1.25.amzn1.i686  
    python35-devel-3.5.7-1.25.amzn1.i686  
    python35-3.5.7-1.25.amzn1.i686  
    python35-test-3.5.7-1.25.amzn1.i686  
    python36-debuginfo-3.6.10-1.16.amzn1.i686  
    python36-libs-3.6.10-1.16.amzn1.i686  
    python36-test-3.6.10-1.16.amzn1.i686  
    python36-debug-3.6.10-1.16.amzn1.i686  
    python36-tools-3.6.10-1.16.amzn1.i686  
    python36-devel-3.6.10-1.16.amzn1.i686  
    python36-3.6.10-1.16.amzn1.i686  
  
src:  
    python27-2.7.16-1.131.amzn1.src  
    python35-3.5.7-1.25.amzn1.src  
    python36-3.6.10-1.16.amzn1.src  
  
x86_64:  
    python27-2.7.16-1.131.amzn1.x86_64  
    python27-libs-2.7.16-1.131.amzn1.x86_64  
    python27-test-2.7.16-1.131.amzn1.x86_64  
    python27-tools-2.7.16-1.131.amzn1.x86_64  
    python27-devel-2.7.16-1.131.amzn1.x86_64  
    python27-debuginfo-2.7.16-1.131.amzn1.x86_64  
    python35-devel-3.5.7-1.25.amzn1.x86_64  
    python35-tools-3.5.7-1.25.amzn1.x86_64  
    python35-test-3.5.7-1.25.amzn1.x86_64  
    python35-debuginfo-3.5.7-1.25.amzn1.x86_64  
    python35-3.5.7-1.25.amzn1.x86_64  
    python35-libs-3.5.7-1.25.amzn1.x86_64  
    python36-tools-3.6.10-1.16.amzn1.x86_64  
    python36-debug-3.6.10-1.16.amzn1.x86_64  
    python36-test-3.6.10-1.16.amzn1.x86_64  
    python36-devel-3.6.10-1.16.amzn1.x86_64  
    python36-libs-3.6.10-1.16.amzn1.x86_64  
    python36-3.6.10-1.16.amzn1.x86_64  
    python36-debuginfo-3.6.10-1.16.amzn1.x86_64  

Additional References

Red Hat: CVE-2019-16935

Mitre: CVE-2019-16935

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

59.2%