CVE-2022-21699

IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipython:ipython:*:*:*:*:*:*:*:*
cpe:2.3:a:ipython:ipython:*:*:*:*:*:*:*:*
cpe:2.3:a:ipython:ipython:*:*:*:*:*:*:*:*
cpe:2.3:a:ipython:ipython:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 8.8
v2 : 4.6
v3 : 8.2
References () https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668 - Patch, Third Party Advisory () https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668 - Patch, Third Party Advisory
References () https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x - Exploit, Third Party Advisory () https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x - Exploit, Third Party Advisory
References () https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699 - Release Notes, Third Party Advisory () https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699 - Release Notes, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/ -

07 Nov 2023, 03:43

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/', 'name': 'FEDORA-2022-b9e38f8a56', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/', 'name': 'FEDORA-2022-b58d156ab0', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/ -

Information

Published : 2022-01-19 22:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21699

Mitre link : CVE-2022-21699

CVE.ORG link : CVE-2022-21699


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

ipython

  • ipython
CWE
CWE-250

Execution with Unnecessary Privileges

CWE-279

Incorrect Execution-Assigned Permissions

CWE-269

Improper Privilege Management