In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://mail.python.org/archives/list/security-announce%40python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/ - | |
References | () https://security.netapp.com/advisory/ntap-20220419-0005/ - Third Party Advisory |
07 Nov 2023, 03:45
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-03-10 17:47
Updated : 2024-11-21 06:54
NVD link : CVE-2022-26488
Mitre link : CVE-2022-26488
CVE.ORG link : CVE-2022-26488
JSON object : View
Products Affected
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
microsoft
- windows
python
- python
CWE
CWE-426
Untrusted Search Path