CVE-2021-3426
20.05.2021, 13:15
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
Vendor | Product | Version |
---|---|---|
python | python | 𝑥 < 2.7.18 |
python | python | 3.6.0 ≤ 𝑥 < 3.6.13 |
python | python | 3.7.0 ≤ 𝑥 < 3.7.10 |
python | python | 3.8.0 ≤ 𝑥 < 3.8.8 |
python | python | 3.9.0 ≤ 𝑥 < 3.9.3 |
python | python | 3.10.0:alpha1 |
python | python | 3.10.0:alpha2 |
python | python | 3.10.0:alpha3 |
python | python | 3.10.0:alpha4 |
python | python | 3.10.0:alpha5 |
python | python | 3.10.0:alpha6 |
debian | debian_linux | 9.0 |
redhat | software_collections | - |
redhat | enterprise_linux | 8.0 |
netapp | cloud_backup | - |
netapp | ontap_select_deploy_administration_utility | - |
netapp | snapcenter | - |
oracle | communications_cloud_native_core_binding_support_function | 1.10.0 |
oracle | zfs_storage_appliance_kit | 8.8 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
python2.7 |
| ||||||||||||||||||||||||
python3.10 |
| ||||||||||||||||||||||||
python3.4 |
| ||||||||||||||||||||||||
python3.5 |
| ||||||||||||||||||||||||
python3.6 |
| ||||||||||||||||||||||||
python3.7 |
| ||||||||||||||||||||||||
python3.8 |
| ||||||||||||||||||||||||
python3.9 |
|
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
References