Description
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
Published: 2024-09-30
Score: 8.7 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0156 RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
Github GHSA Github GHSA GHSA-5rfv-66g4-jr8h RestrictedPython information leakage via `AttributeError.obj` and the `string` module
Ubuntu USN Ubuntu USN USN-7355-1 RestrictedPython vulnerabilities
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Mon, 30 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Zope
Zope restrictedpython
CPEs cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:*
Vendors & Products Zope
Zope restrictedpython
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Sep 2024 15:45:00 +0000

Type Values Removed Values Added
Description RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
Title RestrictedPython information leakage via `AttributeError.obj` and the `string` module
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Zope Restrictedpython
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-30T17:29:29.522Z

Reserved: 2024-09-25T21:46:10.929Z

Link: CVE-2024-47532

cve-icon Vulnrichment

Updated: 2024-09-30T17:29:21.755Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-30T16:15:09.960

Modified: 2024-11-15T17:59:51.307

Link: CVE-2024-47532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses