In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
References
Link | Resource |
---|---|
https://mail.python.org/archives/list/security-announce@python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/ | Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220419-0005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Information
Published : 2022-03-10 09:47
Updated : 2022-09-02 20:34
NVD link : CVE-2022-26488
Mitre link : CVE-2022-26488
JSON object : View
CWE
CWE-426
Untrusted Search Path
Products Affected
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
microsoft
- windows
python
- python