Количество 4
Количество 4
CVE-2024-47532
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
CVE-2024-47532
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
CVE-2024-47532
RestrictedPython is a restricted execution environment for Python to r ...
GHSA-5rfv-66g4-jr8h
RestrictedPython information leakage via `AttributeError.obj` and the `string` module
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-47532 RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment. | CVSS3: 6.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-47532 RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment. | CVSS3: 6.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-47532 RestrictedPython is a restricted execution environment for Python to r ... | CVSS3: 6.5 | 1% Низкий | больше 1 года назад | |
GHSA-5rfv-66g4-jr8h RestrictedPython information leakage via `AttributeError.obj` and the `string` module | CVSS3: 7.5 | 1% Низкий | больше 1 года назад |
Уязвимостей на страницу