Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-41334
HistoryMar 18, 2024 - 6:48 p.m.

CVE-2023-41334 astropy vulnerable to RCE in TranformGraph().to_dot_graph function

2024-03-1818:48:14
CWE-77
GitHub_M
www.cve.org
astropy
python
astronomy
vulnerable
remote code execution
input validation
fix

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

15.7%

Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the TranformGraph().to_dot_graph function. A malicious user can provide a command or a script file as a value to the savelayout argument, which will be placed as the first value in a list of arguments passed to subprocess.Popen. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.

CNA Affected

[
  {
    "vendor": "astropy",
    "product": "astropy",
    "versions": [
      {
        "version": "= 5.3.2",
        "status": "affected"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2023-41334