Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-16935

Published: 28 September 2019

The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.

Notes

AuthorNote
leosilva
this bug address to the docxmlrpc test hang issue:
https://bugs.python.org/issue27614.

Priority

Low

Cvss 3 Severity Score

6.1

Score breakdown

Status

Package Release Status
python2.7
Launchpad, Ubuntu, Debian
bionic
Released (2.7.15-4ubuntu4~18.04.2)
disco
Released (2.7.16-2ubuntu0.2)
eoan Not vulnerable
(2.7.17~rc1-1)
focal Not vulnerable
(2.7.17-1ubuntu5)
trusty
Released (2.7.6-8ubuntu0.6+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needs triage

xenial
Released (2.7.12-1ubuntu0~16.04.9)
impish Not vulnerable
(2.7.17-1ubuntu5)
groovy Not vulnerable
(2.7.17-1ubuntu5)
hirsute Not vulnerable
(2.7.17-1ubuntu5)
kinetic Not vulnerable
(2.7.17-1ubuntu5)
lunar Does not exist

jammy Not vulnerable
(2.7.17-1ubuntu5)
mantic Does not exist

Patches:
upstream: https://github.com/python/cpython/commit/8eb64155ff26823542ccf0225b3d57b6ae36ea89



python3.4
Launchpad, Ubuntu, Debian
trusty
Released (3.4.3-1ubuntu1~14.04.7+esm4)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needs triage

bionic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

xenial Does not exist

impish Does not exist

groovy Does not exist

hirsute Does not exist

kinetic Does not exist

lunar Does not exist

jammy Does not exist

mantic Does not exist

python3.5
Launchpad, Ubuntu, Debian
bionic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

trusty Needs triage

upstream Needs triage

impish Does not exist

groovy Does not exist

hirsute Does not exist

kinetic Does not exist

lunar Does not exist

jammy Does not exist

xenial
Released (3.5.2-2ubuntu0~16.04.9)
mantic Does not exist

python3.6
Launchpad, Ubuntu, Debian
impish Does not exist

groovy Does not exist

hirsute Does not exist

jammy Does not exist

kinetic Does not exist

lunar Does not exist

bionic
Released (3.6.8-1~18.04.3)
disco Does not exist

eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

mantic Does not exist

Patches:

upstream: https://github.com/python/cpython/commit/1698cacfb924d1df452e78d11a4bf81ae7777389


python3.7
Launchpad, Ubuntu, Debian
impish Does not exist

groovy Does not exist

hirsute Does not exist

jammy Does not exist

kinetic Does not exist

lunar Does not exist

bionic Needs triage

disco
Released (3.7.3-2ubuntu0.2)
eoan Not vulnerable
(3.7.5~rc1-1)
focal Does not exist

trusty Does not exist

upstream
Released (3.7.5~rc1-1)
xenial Does not exist

mantic Does not exist

Patches:


upstream: https://github.com/python/cpython/commit/39a0c7555530e31c6941a78da19b6a5b61170687

python3.8
Launchpad, Ubuntu, Debian
impish Does not exist

groovy Not vulnerable
(3.8.0~rc1-1)
jammy Does not exist

kinetic Does not exist

lunar Does not exist

bionic Needs triage

disco Ignored
(end of life)
eoan Not vulnerable
(3.8.0~rc1-1)
focal Not vulnerable
(3.8.0~rc1-1)
hirsute Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

mantic Does not exist

Patches:



upstream: https://github.com/python/cpython/commit/6447b9f9bd27e1f6b04cef674dd3a7ab27bf4f28

Severity score breakdown

Parameter Value
Base score 6.1
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Changed
Confidentiality Low
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N