Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-9287

Опубликовано: 22 окт. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

A vulnerability has been found in the CPython venv module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

РелизСтатусПримечание
devel

DNE

esm-apps/focal

not-affected

Vulnerable code not present
esm-apps/jammy

not-affected

Vulnerable code not present
esm-infra-legacy/trusty

not-affected

Vulnerable code not present
esm-infra/bionic

not-affected

Vulnerable code not present
esm-infra/xenial

not-affected

Vulnerable code not present
focal

not-affected

Vulnerable code not present
jammy

not-affected

Vulnerable code not present
noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

released

3.10.12-1~22.04.7
noble

DNE

oracular

DNE

plucky

DNE

upstream

released

3.10.16

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/jammy

released

3.11.0~rc1-1~22.04.1~esm2
esm-infra/focal

DNE

focal

DNE

jammy

needed

noble

DNE

oracular

DNE

plucky

DNE

upstream

released

3.11.11

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

released

3.12.3-1ubuntu0.3
oracular

released

3.12.7-1ubuntu1
plucky

DNE

upstream

released

3.12.8

Показывать по

РелизСтатусПримечание
devel

not-affected

3.13.3-2
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

released

3.13.0-1ubuntu0.1
plucky

not-affected

3.13.3-1
upstream

released

3.13.1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

3.4.3-1ubuntu1~14.04.7+esm14
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

trusty/esm

ignored

end of ESM support, was needs-triage
upstream

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

3.5.2-2ubuntu0~16.04.4~14.04.1+esm4
esm-infra/focal

DNE

esm-infra/xenial

released

3.5.2-2ubuntu0~16.04.13+esm16
focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

trusty/esm

ignored

end of ESM support, was needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

released

3.6.9-1~18.04ubuntu1.13+esm3
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

released

3.7.5-2ubuntu1~18.04.2+esm4
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

released

3.8.0-3ubuntu1~18.04.2+esm3
esm-infra/focal

not-affected

3.8.10-0ubuntu1~20.04.16
focal

released

3.8.10-0ubuntu1~20.04.16
jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/focal

released

3.9.5-3ubuntu0~20.04.1+esm3
focal

ignored

end of standard support, was needed
jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

released

3.9.21

Показывать по

EPSS

Процентиль: 10%
0.00038
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.3
redhat
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
nvd
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
8 месяцев назад

A vulnerability has been found in the CPython `venv` module and CLI wh ...

suse-cvrf
5 месяцев назад

Security update for python312

EPSS

Процентиль: 10%
0.00038
Низкий

7.8 High

CVSS3

Уязвимость CVE-2024-9287