Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-26488

Опубликовано: 10 мар. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 7

Описание

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

РелизСтатусПримечание
bionic

not-affected

windows only
devel

not-affected

windows only
esm-apps/focal

not-affected

windows only
esm-apps/jammy

not-affected

windows only
esm-infra-legacy/trusty

not-affected

windows only
esm-infra/bionic

not-affected

windows only
esm-infra/xenial

not-affected

windows only
focal

not-affected

windows only
impish

not-affected

windows only
jammy

not-affected

windows only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

windows only
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

impish

not-affected

windows only
jammy

not-affected

windows only
trusty

DNE

trusty/esm

DNE

upstream

not-affected

windows only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

windows only
esm-infra/focal

DNE

focal

DNE

impish

DNE

jammy

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

windows only
upstream

not-affected

windows only

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

windows only
esm-infra/focal

DNE

esm-infra/xenial

not-affected

windows only
focal

DNE

impish

DNE

jammy

DNE

trusty

ignored

end of standard support
trusty/esm

not-affected

windows only

Показывать по

РелизСтатусПримечание
bionic

not-affected

windows only
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

windows only
esm-infra/focal

DNE

focal

DNE

impish

DNE

jammy

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

windows only
devel

DNE

esm-apps/bionic

not-affected

windows only
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

impish

DNE

jammy

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

windows only
devel

DNE

esm-apps/bionic

not-affected

windows only
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

windows only
focal

not-affected

windows only
impish

DNE

jammy

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-apps/focal

not-affected

windows only
esm-infra-legacy/trusty

DNE

focal

not-affected

windows only
impish

not-affected

windows only
jammy

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

windows only

Показывать по

Ссылки на источники

EPSS

Процентиль: 74%
0.0089
Низкий

4.4 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
9 месяцев назад

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

CVSS3: 7
nvd
больше 3 лет назад

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

CVSS3: 7
debian
больше 3 лет назад

In Python before 3.10.3 on Windows, local users can gain privileges be ...

CVSS3: 7
github
больше 3 лет назад

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

CVSS3: 7
fstec
больше 1 года назад

Уязвимость интерпретатора языка программирования Python, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 74%
0.0089
Низкий

4.4 Medium

CVSS2

7 High

CVSS3

Уязвимость CVE-2022-26488