Loading HuntDB...

CVE-2024-47532

UNKNOWN
Published 2024-09-30T15:29:57.907Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-47532. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

RestrictedPython information leakage via `AttributeError.obj` and the `string` module

GHSA-5rfv-66g4-jr8h

Advisory Details

### Impact A user can gain access to protected (and potentially sensible) information indirectly via `AttributeError.obj` and the `string` module. ### Patches The problem will be fixed in version 7.3. ### Workarounds If the application does not require access to the module `string`, it can remove it from `RestrictedPython.Utilities.utility_builtins` or otherwise do not make it available in the restricted execution environment.

Affected Packages

PyPI RestrictedPython
ECOSYSTEM: ≥0 <7.3

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Advisory provided by GitHub Security Advisory Database. Published: September 30, 2024, Modified: January 21, 2025

References

Published: 2024-09-30T15:29:57.907Z
Last Modified: 2024-09-30T17:29:29.522Z
Copied to clipboard!