CVE-2022-26488
10.03.2022, 17:47
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.Enginsight
Vendor | Product | Version |
---|---|---|
python | python | 𝑥 ≤ 3.7.12 |
python | python | 3.8.0 ≤ 𝑥 ≤ 3.8.12 |
python | python | 3.9.0 ≤ 𝑥 ≤ 3.9.10 |
python | python | 3.10.0 ≤ 𝑥 ≤ 3.10.2 |
python | python | 3.11.0:alpha1 |
python | python | 3.11.0:alpha2 |
python | python | 3.11.0:alpha3 |
python | python | 3.11.0:alpha4 |
python | python | 3.11.0:alpha5 |
python | python | 3.11.0:alpha6 |
netapp | active_iq_unified_manager | - |
netapp | ontap_select_deploy_administration_utility | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
python2.7 |
| ||||||||||||
python3.10 |
| ||||||||||||
python3.4 |
| ||||||||||||
python3.5 |
| ||||||||||||
python3.6 |
| ||||||||||||
python3.7 |
| ||||||||||||
python3.8 |
| ||||||||||||
python3.9 |
|
Common Weakness Enumeration
References