Описание
A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.
An unintended import flaw was found in the PyPI future package. When the module is loaded, it automatically imports test.py if present in the same directory or the sys.path. This behavior allows an attacker who can write files to the server to execute arbitrary code.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
OpenShift Serverless | openshift-serverless-1/kn-eventing-istio-controller-rhel8 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-cni-rhel9 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-must-gather-rhel9 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-pilot-rhel9 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-proxyv2-rhel9 | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-rhel9-operator | Not affected | ||
OpenShift Service Mesh 3 | openshift-service-mesh/istio-sail-operator-bundle | Not affected | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/aap-cloud-metrics-collector-rhel8 | Not affected | ||
Red Hat Ansible Automation Platform 2 | ansible-automation-platform-25/ansible-dev-tools-rhel8 | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
7.3 High
CVSS3
Связанные уязвимости
A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.
A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code.
A vulnerability in the Python-Future 1.0.0 module allows for arbitrary ...
EPSS
7.3 High
CVSS3