RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
References
Link | Resource |
---|---|
https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6 | Patch |
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h | Exploit Mitigation Vendor Advisory |
Configurations
History
15 Nov 2024, 17:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:* | |
First Time |
Zope restrictedpython
Zope |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6 - Patch | |
References | () https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h - Exploit, Mitigation, Vendor Advisory |
04 Oct 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-30 16:15
Updated : 2024-11-15 17:59
NVD link : CVE-2024-47532
Mitre link : CVE-2024-47532
CVE.ORG link : CVE-2024-47532
JSON object : View
Products Affected
zope
- restrictedpython
CWE