pysec-2024-186
Vulnerability from pysec
Published
2024-09-30 16:15
Modified
2025-01-19 04:23
Severity ?
Details
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
Impacted products
Name | purl |
---|---|
restrictedpython | pkg:pypi/restrictedpython |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "restrictedpython", purl: "pkg:pypi/restrictedpython", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "d701cc36cccac36b21fa200f1f2d1945a9a215e6", }, ], repo: "https://github.com/zopefoundation/restrictedpython", type: "GIT", }, { events: [ { introduced: "0", }, { fixed: "7.3", }, ], type: "ECOSYSTEM", }, ], versions: [ "3.4.2", "3.4.3", "3.5.0", "3.5.1", "3.5.2", "3.6.0", "3.6.0a1", "4.0", "4.0a1", "4.0a2", "4.0a3", "4.0b1", "4.0b2", "4.0b3", "4.0b4", "4.0b5", "4.0b6", "4.0b7", "4.0b8", "5.0", "5.1", "5.2", "5.2a1.dev0", "5.3", "5.3a1.dev0", "5.4", "6.0", "6.0a1.dev0", "6.1", "6.2", "7.0", "7.0a1.dev0", "7.0a1.dev1", "7.0a2.dev0", "7.1", "7.2", "7.2a1.dev0", ], }, ], aliases: [ "CVE-2024-47532", "GHSA-5rfv-66g4-jr8h", ], details: "RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.", id: "PYSEC-2024-186", modified: "2025-01-19T04:23:01.259448+00:00", published: "2024-09-30T16:15:09+00:00", references: [ { type: "ADVISORY", url: "https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h", }, { type: "EVIDENCE", url: "https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h", }, { type: "FIX", url: "https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6", }, ], severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.