Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-47532
HistorySep 30, 2024 - 3:29 p.m.

CVE-2024-47532 RestrictedPython information leakage via `AttributeError.obj` and the `string` module

2024-09-3015:29:57
CWE-200
GitHub_M
www.cve.org
1
cve-2024-47532
restrictedpython
information leakage
attributeerror.obj
string module
version 7.3
workaround
restrictedpython.utilities.utility_builtins

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

EPSS

0

Percentile

9.6%

RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.

CNA Affected

[
  {
    "vendor": "zopefoundation",
    "product": "RestrictedPython",
    "versions": [
      {
        "version": "< 7.3",
        "status": "affected"
      }
    ]
  }
]

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-47532