Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-41334

Опубликовано: 18 мар. 2024
Источник: debian
EPSS Низкий

Описание

Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
astropyfixed5.3.3-1package
astropyno-dsabookwormpackage
astropyno-dsabullseyepackage

Примечания

  • https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf

  • https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5 (v5.3.3)

EPSS

Процентиль: 89%
0.04306
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
почти 2 года назад

Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.

CVSS3: 8.4
nvd
почти 2 года назад

Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.

CVSS3: 8.4
github
почти 2 года назад

RCE in TranformGraph().to_dot_graph function

EPSS

Процентиль: 89%
0.04306
Низкий