Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15801

Опубликовано: 17 июл. 2020
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The ._pth file (e.g., the python._pth file) is not affected.

РелизСтатусПримечание
bionic

not-affected

Windows-specific
devel

not-affected

Windows-specific
esm-apps/focal

not-affected

Windows-specific
esm-infra-legacy/trusty

not-affected

Windows-specific
esm-infra/bionic

not-affected

Windows-specific
esm-infra/xenial

not-affected

Windows-specific
focal

not-affected

Windows-specific
precise/esm

not-affected

Windows-specific
trusty

ignored

end of standard support
trusty/esm

not-affected

Windows-specific

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows-specific
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

Windows-specific
upstream

not-affected

Windows-specific
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

Windows-specific
esm-infra/focal

DNE

esm-infra/xenial

not-affected

Windows-specific
focal

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

Windows-specific
upstream

not-affected

Windows-specific

Показывать по

РелизСтатусПримечание
bionic

not-affected

Windows-specific
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

Windows-specific
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

not-affected

Windows-specific

Показывать по

РелизСтатусПримечание
bionic

not-affected

Windows-specific
devel

DNE

esm-apps/bionic

not-affected

Windows-specific
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

not-affected

Windows-specific

Показывать по

РелизСтатусПримечание
bionic

not-affected

Windows-specific
devel

not-affected

Windows-specific
esm-apps/bionic

not-affected

Windows-specific
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

Windows-specific
focal

not-affected

Windows-specific
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

not-affected

Windows-specific

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

Windows-specific
esm-apps/focal

not-affected

Windows-specific
esm-infra-legacy/trusty

DNE

focal

not-affected

Windows-specific
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

not-affected

Windows-specific
xenial

DNE

Показывать по

EPSS

Процентиль: 67%
0.00558
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.4
redhat
почти 5 лет назад

In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVSS3: 9.8
nvd
почти 5 лет назад

In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVSS3: 9.8
debian
почти 5 лет назад

In Python 3.8.4, sys.path restrictions specified in a python38._pth fi ...

CVSS3: 9.8
github
около 3 лет назад

In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVSS3: 9.8
fstec
почти 5 лет назад

Уязвимость файла python38._pth интерпретатора языка программирования Python, связанная с игнорированием ограничений sys.path, указанных в файле python38._pth, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 67%
0.00558
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2020-15801