RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
Metrics |
cvssV3_1
|
Mon, 30 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zope
Zope restrictedpython |
|
CPEs | cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zope
Zope restrictedpython |
|
Metrics |
ssvc
|
Mon, 30 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment. | |
Title | RestrictedPython information leakage via `AttributeError.obj` and the `string` module | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-30T17:29:29.522Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47532

Updated: 2024-09-30T17:29:21.755Z

Status : Analyzed
Published: 2024-09-30T16:15:09.960
Modified: 2024-11-15T17:59:51.307
Link: CVE-2024-47532

No data.