5.7 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.7 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
25.0%
There’s a flaw in Python 3’s pydoc. A local or adjacent attacker who
discovers or is able to convince another local or adjacent user to start a
pydoc server could access the server and use it to disclose sensitive
information belonging to the other user that they would not normally be
able to access. The highest risk of this flaw is to data confidentiality.
This flaw affects Python versions before 3.8.9, Python versions before
3.9.3 and Python versions before 3.10.0a7.
Author | Note |
---|---|
mdeslaur | getfile introduced in 3.2.0 |
sbeattie | upstream fixed this by removing the getfile feature |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | python3.4 | < 3.4.3-1ubuntu1~14.04.7+esm12) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 14.04 | noarch | python3.5 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | python3.5 | < 3.5.2-2ubuntu0~16.04.13+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | python3.6 | < 3.6.9-1~18.04ubuntu1.7 | UNKNOWN |
ubuntu | 18.04 | noarch | python3.7 | < 3.7.5-2ubuntu1~18.04.2+esm1 | UNKNOWN |
ubuntu | 18.04 | noarch | python3.8 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | python3.9 | < 3.9.5-3~20.04.1 | UNKNOWN |
ubuntu | 20.10 | noarch | python3.9 | < 3.9.5-3~20.10.1 | UNKNOWN |
ubuntu | 21.04 | noarch | python3.9 | < 3.9.5-3~21.04 | UNKNOWN |
ubuntu | 21.10 | noarch | python3.9 | < 3.9.5-2ubuntu1 | UNKNOWN |
github.com/python/cpython/pull/24285
github.com/python/cpython/pull/24337
launchpad.net/bugs/cve/CVE-2021-3426
nvd.nist.gov/vuln/detail/CVE-2021-3426
python-security.readthedocs.io/vuln/pydoc-getfile.html
security-tracker.debian.org/tracker/CVE-2021-3426
ubuntu.com/security/notices/USN-5342-1
ubuntu.com/security/notices/USN-5342-3
www.cve.org/CVERecord?id=CVE-2021-3426
5.7 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.7 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
25.0%