Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0229 | RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's \"format\" functionality allows someone controlling the format string to \"read\" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and via `string.Formatter`. All known versions of `RestrictedPython` are vulnerable. This issue has been addressed in commit `4134aedcff1` which has been included in the 5.4 and 6.2 releases. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n |
Github GHSA |
GHSA-xjw2-6jm9-rf67 | Sandbox escape via various forms of "format". |
Ubuntu USN |
USN-7355-1 | RestrictedPython vulnerabilities |
Tue, 01 Oct 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-01T18:16:40.852Z
Reserved: 2023-08-22T16:57:23.932Z
Link: CVE-2023-41039
Updated: 2024-08-02T18:46:11.579Z
Status : Modified
Published: 2023-08-30T18:15:09.880
Modified: 2024-11-21T08:20:26.090
Link: CVE-2023-41039
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN