Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-9287

Опубликовано: 22 окт. 2024
Источник: debian

Описание

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python3.13fixed3.13.1-1package
python3.12fixed3.12.8-1package
python3.11removedpackage
python3.11fixed3.11.2-6+deb12u5bookwormpackage
python3.9removedpackage
python2.7not-affectedpackage
pypy3fixed7.3.17+dfsg-3package
pypy3fixed7.3.11+dfsg-2+deb12u3bookwormpackage

Примечания

  • https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/

  • https://github.com/python/cpython/issues/124651

  • https://github.com/python/cpython/pull/124712

  • https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 (v3.13.1)

  • https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db (v3.12.8)

  • https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 (v3.11.11)

  • https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 (v3.9.21)

Связанные уязвимости

CVSS3: 7.8
ubuntu
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 6.3
redhat
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
nvd
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
msrc
3 месяца назад

Описание отсутствует

suse-cvrf
5 месяцев назад

Security update for python312