BIT-python-2022-26488

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/python/BIT-python-2022-26488.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-python-2022-26488
Aliases
Published
2024-10-04T16:38:49.929Z
Modified
2024-10-04T17:02:25.936Z
Summary
[none]
Details

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

Database specific
{
    "cpes": [
        "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / python

Package

Name
python
Purl
pkg:bitnami/python

Severity

  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.13
Introduced
3.10.0
Fixed
3.10.3
Introduced
3.9.0
Fixed
3.9.11
Introduced
3.8.0
Fixed
3.8.13