CVE-2022-21699

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-21699
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-21699.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-21699
Aliases
Downstream
Related
Published
2022-01-19T21:15:11Z
Modified
2025-10-20T20:00:24.612408Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Execution with Unnecessary Privileges in ipython
Details

IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.

Database specific
{
    "cwe_ids": [
        "CWE-250",
        "CWE-279"
    ]
}
References

Affected packages

Git / github.com/ipython/ipython

Affected ranges

Type
GIT
Repo
https://github.com/ipython/ipython
Events
Type
GIT
Repo
https://github.com/ipython/ipython
Events
Type
GIT
Repo
https://github.com/ipython/ipython
Events

Affected versions

6.*

6.0.0
6.1.0
6.2.0
6.3.0

7.*

7.0.0
7.0.0-doc
7.0.0b1
7.0.0rc1
7.0.1
7.1.0
7.1.1
7.10.0
7.10.1
7.11.0
7.11.1
7.12.0
7.13.0
7.14.0
7.15.0
7.16.0
7.16.1
7.16.2
7.17.0
7.18.0
7.18.1
7.19.0
7.2.0
7.20.0
7.21.0
7.22.0
7.23.0
7.23.1
7.24.0
7.24.1
7.25.0
7.26.0
7.27.0
7.28.0
7.29.0
7.3.0
7.30.0
7.30.1
7.31.0
7.4.0
7.5.0
7.6.0
7.6.1
7.7.0
7.8.0
7.9.0

8.*

8.0.0