CVE-2024-29189

PyAnsys Geometry is a Python client library for the Ansys Geometry service and other CAD Ansys products. On file src/ansys/geometry/core/connection/product_instance.py, upon calling this method _start_program directly, users could exploit its usage to perform malicious operations on the current machine where the script is ran. This vulnerability is fixed in 0.3.3 and 0.4.12.
Configurations

No configuration.

History

21 Nov 2024, 09:07

Type Values Removed Values Added
References () https://bandit.readthedocs.io/en/1.7.8/plugins/b602_subprocess_popen_with_shell_equals_true.html - () https://bandit.readthedocs.io/en/1.7.8/plugins/b602_subprocess_popen_with_shell_equals_true.html -
References () https://github.com/ansys/pyansys-geometry/blob/52cba1737a8a7812e5430099f715fa2160ec007b/src/ansys/geometry/core/connection/product_instance.py#L403-L428 - () https://github.com/ansys/pyansys-geometry/blob/52cba1737a8a7812e5430099f715fa2160ec007b/src/ansys/geometry/core/connection/product_instance.py#L403-L428 -
References () https://github.com/ansys/pyansys-geometry/commit/902071701c4f3a8258cbaa46c28dc0a65442d1bc - () https://github.com/ansys/pyansys-geometry/commit/902071701c4f3a8258cbaa46c28dc0a65442d1bc -
References () https://github.com/ansys/pyansys-geometry/commit/f82346b9432b06532e84f3278125f5879b4e9f3f - () https://github.com/ansys/pyansys-geometry/commit/f82346b9432b06532e84f3278125f5879b4e9f3f -
References () https://github.com/ansys/pyansys-geometry/pull/1076 - () https://github.com/ansys/pyansys-geometry/pull/1076 -
References () https://github.com/ansys/pyansys-geometry/pull/1077 - () https://github.com/ansys/pyansys-geometry/pull/1077 -
References () https://github.com/ansys/pyansys-geometry/security/advisories/GHSA-38jr-29fh-w9vm - () https://github.com/ansys/pyansys-geometry/security/advisories/GHSA-38jr-29fh-w9vm -

26 Mar 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) PyAnsys Geometry es una librería cliente de Python para el servicio Ansys Geometry y otros productos CAD Ansys. En el archivo src/ansys/geometry/core/connection/product_instance.py, al llamar directamente a este método _start_program, los usuarios podrían explotar su uso para realizar operaciones maliciosas en la máquina actual donde se ejecuta el script. Esta vulnerabilidad se solucionó en 0.3.3 y 0.4.12.

26 Mar 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 03:15

Updated : 2024-11-21 09:07


NVD link : CVE-2024-29189

Mitre link : CVE-2024-29189

CVE.ORG link : CVE-2024-29189


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')