Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-9287

Опубликовано: 22 окт. 2024
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

A vulnerability has been found in the CPython venv module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия до 3.9.21 (исключая)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия от 3.10.0 (включая) до 3.10.16 (исключая)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия от 3.11.0 (включая) до 3.11.11 (исключая)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия от 3.12.0 (включая) до 3.12.8 (исключая)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия от 3.13.0 (включая) до 3.13.1 (исключая)
cpe:2.3:a:python:python:3.14.0:alpha1:*:*:*:*:*:*

EPSS

Процентиль: 15%
0.00048
Низкий

7.8 High

CVSS3

Дефекты

CWE-428
CWE-77

Связанные уязвимости

CVSS3: 7.8
ubuntu
11 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 6.3
redhat
11 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
msrc
6 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
11 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI wh ...

suse-cvrf
8 месяцев назад

Security update for python312

EPSS

Процентиль: 15%
0.00048
Низкий

7.8 High

CVSS3

Дефекты

CWE-428
CWE-77