Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-47532
HistorySep 30, 2024 - 3:29 p.m.

CVE-2024-47532 RestrictedPython information leakage via `AttributeError.obj` and the `string` module

2024-09-3015:29:57
CWE-200
GitHub_M
github.com
cve-2024-47532
restrictedpython
information leakage
attributeerror
string module
version 7.3
workaround
execution environment

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.6%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zope",
    "product": "restrictedpython",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "7.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.6%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-47532