Описание
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.7.15-4ubuntu4~18.04.1 |
cosmic | released | 2.7.16-2~18.10 |
devel | DNE | |
disco | not-affected | 2.7.16-2 |
eoan | not-affected | 2.7.16-2 |
esm-apps/focal | not-affected | 2.7.16-2 |
esm-apps/jammy | not-affected | 2.7.16-2 |
esm-infra-legacy/trusty | not-affected | 2.7.6-8ubuntu0.6+esm2 |
esm-infra/bionic | not-affected | 2.7.15-4ubuntu4~18.04.1 |
esm-infra/xenial | not-affected | 2.7.12-1ubuntu0~16.04.8 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | not-affected | 3.4.3-1ubuntu1~14.04.7+esm2 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | not-affected | 3.5.2-2ubuntu0~16.04.4~14.04.1+esm1 |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | 3.5.2-2ubuntu0~16.04.8 |
focal | DNE | |
groovy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 3.6.8-1~18.04.2 |
cosmic | ignored | end of life |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 3.6.8-1~18.04.2 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
cosmic | ignored | end of life |
devel | DNE | |
disco | released | 3.7.3-2ubuntu0.1 |
eoan | not-affected | 3.7.4~rc2-1 |
esm-apps/bionic | not-affected | 3.7.5-2 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE |
Показывать по
6.4 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, w ...
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
Уязвимость модуля urllib интерпретатора языка программирования Python, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
6.4 Medium
CVSS2
9.1 Critical
CVSS3