aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHye-Shik Chang <perky@FreeBSD.org>2005-02-04 04:26:10 +0000
committerHye-Shik Chang <perky@FreeBSD.org>2005-02-04 04:26:10 +0000
commitf4c32e5e5983841d8bfb16822bcdc7e6d2803907 (patch)
tree92168cef04e2641e79066af2e1b77a1b74dd21d9
parent3256b6c2e3a068a7fa2c6d3b2d13d5f37ce79109 (diff)
Notes
-rw-r--r--security/vuxml/vuln.xml10
1 files changed, 5 insertions, 5 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8e2b52e1ad9f..64c4c7082f9b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -55,17 +55,17 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
can give remote attackers access to internals of the
registered object or its module or possibly other modules.
The flaw only affects Python XML-RPC servers that use the
- register_instance() method to register an object without
- a _dispatch() method. Servers using only register_function()
- are not affected.</p>
+ <code>register_instance()</code> method to register an object
+ without a <code>_dispatch()</code> method. Servers using
+ only <code>register_function()</code> are not affected.</p>
<p>On vulnerable XML-RPC servers, a remote attacker may
be able to view or modify globals of the module(s)
containing the registered instance's class(es), potentially
leading to data loss or arbitrary code execution. If the
registered object is a module, the danger is particularly
serious. For example, if the registered module imports
- the os module, an attacker could invoke the os.system()
- function.</p>
+ the <code>os</code> module, an attacker could invoke the
+ <code>os.system()</code> function.</p>
</blockquote>
<p><strong>Note:</strong> This vulnerability affects your
system only if you're running