PYSEC-2023-159

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/restrictedpython/PYSEC-2023-159.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2023-159
Aliases
Published
2023-08-30T18:15:00Z
Modified
2023-11-01T05:02:51.334215Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With RestrictedPython, the format functionality is available via the format and format_map methods of str (and unicode) (accessed either via the class or its instances) and via string.Formatter. All known versions of RestrictedPython are vulnerable. This issue has been addressed in commit 4134aedcff1 which has been included in the 5.4 and 6.2 releases. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

PyPI / restrictedpython

Package

Name
restrictedpython
View open source insights on deps.dev
Purl
pkg:pypi/restrictedpython

Affected ranges

Type
GIT
Repo
https://github.com/zopefoundation/RestrictedPython
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
6.0
Fixed
6.2
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4

Affected versions

3.*

3.4.2
3.4.3
3.5.0
3.5.1
3.5.2
3.6.0a1
3.6.0

4.*

4.0a1
4.0a2
4.0a3
4.0b1
4.0b2
4.0b3
4.0b4
4.0b5
4.0b6
4.0b7
4.0b8
4.0

5.*

5.0
5.1
5.2a1.dev0
5.2
5.3a1.dev0
5.3

6.*

6.0
6.1