Description
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2008-5953 | Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory. |
Ubuntu USN |
USN-1596-1 | Python 2.6 vulnerabilities |
Ubuntu USN |
USN-1613-1 | Python 2.5 vulnerabilities |
Ubuntu USN |
USN-1613-2 | Python 2.4 vulnerabilities |
Ubuntu USN |
USN-1616-1 | Python 3.1 vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T11:13:14.117Z
Reserved: 2009-01-27T00:00:00.000Z
Link: CVE-2008-5983
No data.
Status : Modified
Published: 2009-01-28T02:30:00.233
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-5983
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN