Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11073
HistoryMay 13, 2020 - 6:55 p.m.

CVE-2020-11073 Remote Code Execution in Autoswitch Python Virtualenv

2020-05-1318:55:14
CWE-77
GitHub_M
www.cve.org
1

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

45.4%

In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious .venv file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0

CNA Affected

[
  {
    "product": "zsh-autoswitch-virtualenv",
    "vendor": "MichaelAquilina",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.16.0"
      }
    ]
  }
]

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

45.4%

Related for CVELIST:CVE-2020-11073