Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-50817

Опубликовано: 14 авг. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-futureremovedpackage
python-futureno-dsabookwormpackage

Примечания

  • https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4

  • https://github.com/PythonCharmers/python-future/issues/268

EPSS

Процентиль: 9%
0.00036
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
26 дней назад

A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.

CVSS3: 7.3
redhat
26 дней назад

A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.

CVSS3: 5.4
nvd
26 дней назад

A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.

suse-cvrf
7 дней назад

Security update for python-future

suse-cvrf
8 дней назад

Security update for python-future

EPSS

Процентиль: 9%
0.00036
Низкий