Lucene search

K
amazonAmazonALAS-2024-2632
HistorySep 12, 2024 - 6:30 p.m.

Important: python2-setuptools

2024-09-1218:30:00
alas.aws.amazon.com
python2-setuptools
vulnerability
remote code execution
download functions
package index
code injection
update
cve-2024-6345

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

Low

Issue Overview:

A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0. (CVE-2024-6345)

Affected Packages:

python2-setuptools

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update python2-setuptools to update your system.

New Packages:

noarch:  
    python2-setuptools-41.2.0-4.amzn2.0.4.noarch  
  
src:  
    python2-setuptools-41.2.0-4.amzn2.0.4.src  

Additional References

Red Hat: CVE-2024-6345

Mitre: CVE-2024-6345

OSVersionArchitecturePackageVersionFilename
Amazon Linux2noarchpython2-setuptools< 41.2.0-4.amzn2.0.4python2-setuptools-41.2.0-4.amzn2.0.4.noarch.rpm

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

Low